What is a DDoS attack?
A Denial of Service (DoS) attack is a malicious attempt to affect the availability of a targeted system, such as a website or application, to legitimate end users. Typically, attackers generate large volumes of packets or requests ultimately overwhelming the target system. In case of a Distributed Denial of Service (DDoS) attack, and the attacker uses multiple compromised or controlled sources to generate the attack.
In general, DDoS attacks can be segregated by which layer of the Open Systems Interconnection (OSI) model they attack. They are most common at the Network (layer 3), Transport (Layer 4), Presentation (Layer 6) and Application (Layer 7) Layers.
Open Systems Interconnection (OSI) Model:
#
|
Layer
|
Application
|
Description
|
Vector Example
|
---|---|---|---|---|
7
|
Application
|
Data
|
Network process to application
|
HTTP floods, DNS query floods
|
6
|
Presentation
|
Data
|
Data representation and encryption
|
SSL abuse
|
5
|
Session
|
Data
|
Interhost communication
|
N/A
|
4
|
Transport
|
Segments
|
End-to-end connections and reliability
|
SYN floods
|
3
|
Network
|
Packets
|
Path determination and logical addressing
|
UDP reflection attacks
|
2
|
Datalinks
|
Frames
|
Physical addressing
|
N/A
|
1
|
Physical
|
Bits
|
Media, signal, and binary transmission
|
N/A
|
DDOS Attack Classification
While thinking about mitigation techniques against these attacks, it is useful to group them as Infrastructure layer (Layers 3 and 4) and Application Layer (Layer 6 and 7) attacks.
DDoS Protection Techniques
Ready to start?
1
Sign up for an AWS account
Your account will be within the AWS Free Tier, which enables you to gain free, hands-on experience with the AWS platform, products, and services.
2
Learn with a preconfigured template and step-by-step tutorials
Experiment and learn about DDoS protection on AWS with step-by-step tutorials.
3
Set up your DDoS protection on AWS
All AWS customers benefit from the automatic protections of AWS Shield Standard, at no additional charge.