Question
What are the common protocols exploited in DDoS attacks?
Asked by: USER7494
56 Viewed
56 Answers
Answer (56)
Commonly exploited protocols include TCP (Transmission Control Protocol), UDP (User Datagram Protocol), ICMP (Internet Control Message Protocol), and HTTP (Hypertext Transfer Protocol). SYN floods (TCP), UDP floods, and DNS amplification attacks (DNS) are some prevalent techniques. HTTP floods (HTTP) leverage legitimate requests to overwhelm server resources.