There are many types of DDOS attacks that are used in attacking systems. They may differ in the method employed, but all of them are primarily designed to either paralyze or even break a server. DDOS attacks may vary depending on the concerted efforts of a group but the tactics used by the perpetrators would usually target site attacks or services which are hosted with high profiled web servers and sometimes banks.
One of the types of DDOS attacks that they would use would be the saturation of servers through the use of external communication messages and requests. Once a system is flooded with several requests, it can only handle a fair amount of bandwidth so if it is bombarded, it usually shuts down and reboots. If you base the DDOS attacks types with flooding then you already have an idea on how attacks are implemented and how systems are forced by individuals to reset thereby consuming more resources which the system needs.
The types of DDOS attacks actually vary according to the method used. Since DDOS attacks can be done in a number of ways, server owners would need to follow the rules in protecting their system. The first of the DDOS attacks types is through disruption of system configuration such as routing information. Another way is through disruption of physical network components and the disruption of system information such as the process of resetting TCP sessions.
If these types of DDOS attacks do not work then attacks can use obstruction of various communication devices and services which are used by server owners so that communications would no longer be possible is actually done. They can also target a computational system of resources such as disk space and bandwidth so that the resources needed by the server would be limited. These five DDOS attacks types are actually the most common ways that are used in attacking a system. They have been the major principles in some other attacks done by server intruders.
Sometimes, if these types of DDOS attacks would not work then intruders can actually use a certain kind of program called a malware. A malware is similar to a virus and it acts to max out the processor’s capacity and trigger various errors in the kernel of the system. Aside from that malwares are actually designed to trigger errors in instructions which are needed by the computer in order for it to be unstable and to lock-up. If the malware continues to attack the computer, a system crash would be inevitable.
Another attack derived from the five Ddos attacks types is the ICMP flood. Also known as the Smurf attack, this type of DDOS attack is actually about flooding. It relies on the configuration of network devices in a computer. Once it finds the configurations, it actually allows packed to be sent from all computer systems and hosts on a particular group or network. The network bandwidth would then be filled up to cause the bandwidth to be used up. Once this happens, the system would cease from working.
These are just examples of some well known types of DDOS attacks.