DDoS attacks are referred to as those attacks whose primary purpose is to disable online services for legitimate users. The most common type of DDoS attacks are volumetric attacks. Attacks of this type result in the overloading of servers, or the congestion of access lines or network devices (such as routers and firewalls) through fraudulent data traffic.
A second, equally dangerous attack, is application attacks. In the case of an application attack, unlike a volumetric attack, there is not a significant increase in the volume of transmitted data, but a multiple increase in the requirements of the victim’s server. In this case, the attacker targets the known vulnerability of the target system, its abuse leading to overloading or crashing the application server. In both cases, it is the primary aim of the attacker to disrupt online services for legitimate users.
During DDoS attacks, attackers use a large number of computers and other network devices scattered across the Internet, all of which target one particular online service selected by the attacker.