Network-based DoS/DDoS attacks and flooding
A common method in which to prevent users from accessing IT resources in general, and network resources specifically, is to use DoS/DDoS mechanisms. The principle here is simple. A network resource can be a network device or a communication line. Loading the resource to the point it is blocked will prevent users from accessing this resource. It's as simple as that. Now the issue is how to load it.
There are two major types of DoS/DDoS attacks that target the network resources:
- Volumetric attacks: These are attacks that overwhelm communication lines to the point they are prevented from carrying user traffic.
- Protocol attacks: These are attacks on network protocols such as ARP and DHCP. When attacking these protocols, we disable the network to stop it from functioning – without ARP devices, we will not know their destination MAC address, and without DHCP, they will not have the IP address.
We will begin with...