Site icon FastNetMon DDoS Detection Tool

Understanding Transport and State-Exhaustion DDoS Attacks

How connection state exhaustion attacks threaten your firewalls and proxies

Transport and state-exhaustion DDoS attacks represent a growing and sophisticated category of denial-of-service threats targeting the resource limitations of network infrastructure. Instead of flooding bandwidth, these attacks exploit the costly state and CPU resources needed to manage connections and sessions in firewalls, proxies, load balancers, and servers. This article breaks down how these attacks work, their evolving vectors, and key considerations for detection and mitigation.

This article is part of a longer series about different types of DDoS attacks. If you’re new here, start with our DDoS taxonomy to understand how transport and state-exhaustion attacks fit within the broader DDoS landscape.

What are Transport and State-Exhaustion Attacks?

Transport and state-exhaustion attacks are closely related but distinct classes of DDoS threats targeting connection management rather than bandwidth:

Though interrelated (transport attacks often cause state exhaustion), the distinction clarifies attack mechanics and informs mitigation strategies.

Why Transport & State-Exhaustion Attacks Matter

Unlike volumetric floods that overwhelm bandwidth pipes, these attacks exploit the asymmetric cost of connection management. Small volumes of malicious traffic can trigger disproportionate resource consumption in stateful devices like firewalls, proxies, and application servers, leading to outages or degraded service.

These attacks can be stealthier and more complex to detect, as they may generate moderate traffic while causing an outsized impact by exhausting CPU, memory, or connection tables.

Common Attack Vectors and Their Impact

In the table below, we summarise some of the most common transport and state-exhaustion attack vectors observed in the wild. For each, we highlight the targeted protocol layer, notable peak attack metrics, and the core resource or mechanism being exploited. This overview provides a quick reference to understand the diversity and impact of these threats.

Attack TypeLayerDescriptionNotable Peak ImpactResource Targeted
SYN Flood3/4Floods half-open TCP connections by sending SYN packets without completing handshake4.2 Tbps seenHalf-open TCP connection queue
TCP Reset Flood4Spoofs TCP RST packets to tear down legitimate sessions prematurely11 Mpps observedSession teardown
HTTP/2 Rapid Reset7Sends excessive RST_STREAM frames to stall backend processing398M resets per second (2023)Backend thread pool exhaustion
HTTP/2 Continuation7Sends endless CONTINUATION frames without END_HEADERS flag, causing memory and CPU exhaustionProof of concept (2024)Memory overflow, CPU spike
QUIC-Loris Initial Flood4/7Abuses QUIC 0-RTT handshake loops causing high CPU loadHigh CPU load (2025)CPU exhaustion during handshake
gRPC SETTINGS/HPACK7Sends continuous SETTINGS frames and abuses header compression to stall applicationsOngoing since 2019–2024Application stall
IP Fragment Overlap3Sends overlapping IP fragments to exhaust reassembly buffers80 Gbps observedBuffer overflow
Pulse-Wave ModulationMetaAlternates bursts and silence to evade detection300–350 Gbps bursts (2024)Evasion of baseline detection

How These Attacks Work: Transport vs. State Exhaustion

Real-World Examples

Key Differences Between Transport and State-Exhaustion Attacks

To better understand how transport-layer attacks differ from state-exhaustion attacks, the table below outlines their key characteristics side-by-side.

AspectTransport AttacksState-Exhaustion Attacks
Primary TargetTransport protocols (TCP, QUIC)Stateful device/application resources
Attack MechanismDisrupting connection setup or teardownConsuming memory, CPU, or state tables
Traffic VolumeModerate to highModerate but resource-intensive
Detection DifficultyModerate (signatures possible)High (behavioral/anomaly detection)

Mitigation Strategies for Transport and State-Exhaustion Attacks

Transport and state-exhaustion DDoS attacks target the resource-intensive connection and session management mechanisms in network devices and servers. Mitigating these sophisticated attacks requires a layered approach combining network-level defences, protocol hardening, and application-aware protections.

Network-Level Defenses

Protocol and Application Hardening

Application-Layer Protections

While FastNetMon excels at network-level detection and mitigation, defending against state-exhaustion attacks targeting application servers and proxies often requires specialised application-layer defences, including:

Conclusion

Transport and state-exhaustion DDoS attacks exploit connection management weaknesses and resource limitations rather than raw bandwidth. Their increasing sophistication at Layer 7 demands layered defence strategies combining stateless filtering, rate limiting, anomaly detection, and infrastructure robustness.

Want a full understanding of different DDoS attack types and how to defend against them? Continue reading our full DDoS taxonomy article to explore the entire landscape of attacks and defence techniques.


About FastNetMon

FastNetMon is a leading solution for network security, offering advanced DDoS detection and mitigation. With real-time analytics and rapid response capabilities, FastNetMon helps organisations protect their infrastructure from evolving cyber threats.

For more information, visit https://fastnetmon.com

Exit mobile version