What are the common protocols exploited in DDoS attacks?

Question

Grade: Education Subject: Ddos
What are the common protocols exploited in DDoS attacks?
Asked by:
56 Viewed 56 Answers

Answer (56)

Best Answer
(363)
Commonly exploited protocols include TCP (Transmission Control Protocol), UDP (User Datagram Protocol), ICMP (Internet Control Message Protocol), and HTTP (Hypertext Transfer Protocol). SYN floods (TCP), UDP floods, and DNS amplification attacks (DNS) are some prevalent techniques. HTTP floods (HTTP) leverage legitimate requests to overwhelm server resources.