How it typically works?
- Asset selection: attackers identify targets with limited upstream capacity or critical endpoints.
- Traffic generation: bots or reflectors produce high packet or byte rates destined to the target.
- Amplification steps: when reflectors are used small queries yield large responses multiplying the attack volume.
- Saturation and collapse: links saturate, queues fill, and legitimate packets are dropped.
Common techniques & variants
- DNS amplification: send small spoofed DNS queries to resolvers that respond with large payloads amplifying traffic.
- NTP amplification: abuse network time protocol servers for large responses.
- Memcached amplification: reflectors return huge responses per request creating massive peaks.
- UDP flood: raw high volume UDP packets to exhaust link capacity.
- Combined reflector attacks: using multiple protocols to aggregate amplified responses.
Impact
Volumetric attacks create immediate large scale outages and are primarily mitigated by network level scrubbing and upstream filtering. For SecOps teams the operational needs include fast telemetry that shows byte rates and flow analytics, pre arranged mitigation contracts with providers, and capacity planning. The cost of mitigation can be substantial and these attacks are often used as blunt force for extortion or as part of larger intrusion campaigns.
Further reading
- Akamai: Understanding volumetric attacks. Read more
- Cloudflare: Record traffic attacks summary. Read more
- Arbor Networks: Amplification and volumetric threat reports. Read more
- US CISA: DDoS incidents and recommendations. Read more