{"id":2737,"date":"2021-05-15T22:03:09","date_gmt":"2021-05-16T03:03:09","guid":{"rendered":"https:\/\/truxgoservers.com\/blog\/?p=2737"},"modified":"2021-05-15T22:03:09","modified_gmt":"2021-05-16T03:03:09","slug":"volumetric-ddos-a-widely-used-variant-of-ddos","status":"publish","type":"post","link":"https:\/\/truxgoservers.com\/blog\/volumetric-ddos-a-widely-used-variant-of-ddos\/","title":{"rendered":"Volumetric DDoS, A Widely Used Variant of DDoS"},"content":{"rendered":"\n<p>Volumetric or Volume Based DDoS attacks are currently one of the most popular. One of their purposes is to saturate the bandwidth of the communication link through which the service is provided, preventing access to the site or causing extreme slowness.<\/p>\n\n\n\n<p>Regardless of the perimeter security equipment that you have (firewalls, ips, waf among others) it is not possible to stop an attack like this without some help from the ISP or some provider that is higher up on the Internet that is capable of absorbing the volume of traffic, filter malicious traffic and send only legitimate traffic to the destination.<\/p>\n\n\n\n<p>While volumetric DDoS attacks are primarily focused on causing congestion, they can also be a sign of an ulterior motive, covering up more sophisticated and surgical DDoS attacks, such as penetration attempts on exposed services. In such cases, attackers may be attempting to cause as much operational disruption and distraction as possible, including monitoring and rapid mutation of their attacks to evade static mitigation techniques. These types of DDoS attacks have been dubbed Trojan Horse DDoS and may be intended to disable a firewall or intrusion prevention system, allowing attackers to infiltrate a network, install malware, and ultimately steal.<\/p>\n\n\n\n<p>Now imagine that the bandwidth of the link is symmetric and 10 Mbps, and that the average consumption of output is 7 Mbps and that of input is 1 Mbps. It is the incoming bandwidth that is exploited in a volumetric attack, generally using traffic amplification techniques, exploiting vulnerabilities in public DNS servers, NTP among others that generally work over UDP.<\/p>\n\n\n\n<p><strong><em>The best we can do to prevent these attacks is:<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>\u25b8<\/em><\/strong>Use flow telemetry analysis, complemented by behavioral analysis to detect anomalies and DDoS attacks. By focusing on understanding what is normal, it is easier to identify abnormalities.<\/p>\n\n\n\n<p><strong><em>\u25b8<\/em><\/strong>When a volumetric DDoS attack is detected, use FlowSpec to automatically activate network-based mitigation to block attacks at the edges of the network.<\/p>\n\n\n\n<p>Also check:<br><a href=\"https:\/\/truxgoservers.com\/blog\/http-flood-ddos-attack-method\/\">HTTP Flood DDoS attack method<\/a><br><a href=\"https:\/\/truxgoservers.com\/blog\/syn-flood-variant-of-ddos-attack\/\">SYN Flood variant of DDoS attack<\/a><br><a href=\"https:\/\/truxgoservers.com\/blog\/icmp-flood-a-denial-of-service-attack-type\/\">ICMP Flood denial of service attack type<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Volumetric or Volume Based DDoS attacks are currently one of the most popular. One of their purposes is to saturate the bandwidth of the communication link through which the service is provided, preventing access to the site or causing extreme slowness. Regardless of the perimeter security equipment that you have (firewalls, ips, waf among others) [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2738,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,11],"tags":[36,100],"class_list":["post-2737","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-ddos","tag-cybersecurity","tag-ddos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Volumetric DDoS, A Widely Used Variant of DDoS - Truxgo Server Blog<\/title>\n<meta name=\"description\" content=\"While we know, DDoS attacks are widely used by criminals, and we will see one that has become popular among criminals called DDoS Volumetric.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/truxgoservers.com\/blog\/volumetric-ddos-a-widely-used-variant-of-ddos\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Volumetric DDoS, A Widely Used Variant of DDoS - Truxgo Server Blog\" \/>\n<meta property=\"og:description\" content=\"While we know, DDoS attacks are widely used by criminals, and we will see one that has become popular among criminals called DDoS Volumetric.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/truxgoservers.com\/blog\/volumetric-ddos-a-widely-used-variant-of-ddos\/\" \/>\n<meta property=\"og:site_name\" content=\"Truxgo Server Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-16T03:03:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/05\/ddOss-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Truxgo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Truxgo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/volumetric-ddos-a-widely-used-variant-of-ddos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/volumetric-ddos-a-widely-used-variant-of-ddos\\\/\"},\"author\":{\"name\":\"Truxgo\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\"},\"headline\":\"Volumetric DDoS, A Widely Used Variant of DDoS\",\"datePublished\":\"2021-05-16T03:03:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/volumetric-ddos-a-widely-used-variant-of-ddos\\\/\"},\"wordCount\":346,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/volumetric-ddos-a-widely-used-variant-of-ddos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/ddOss-1.jpg\",\"keywords\":[\"Cybersecurity\",\"DDOS\"],\"articleSection\":[\"Cybersecurity\",\"DDOS\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/volumetric-ddos-a-widely-used-variant-of-ddos\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/volumetric-ddos-a-widely-used-variant-of-ddos\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/volumetric-ddos-a-widely-used-variant-of-ddos\\\/\",\"name\":\"Volumetric DDoS, A Widely Used Variant of DDoS - Truxgo Server Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/volumetric-ddos-a-widely-used-variant-of-ddos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/volumetric-ddos-a-widely-used-variant-of-ddos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/ddOss-1.jpg\",\"datePublished\":\"2021-05-16T03:03:09+00:00\",\"description\":\"While we know, DDoS attacks are widely used by criminals, and we will see one that has become popular among criminals called DDoS Volumetric.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/volumetric-ddos-a-widely-used-variant-of-ddos\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/volumetric-ddos-a-widely-used-variant-of-ddos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/volumetric-ddos-a-widely-used-variant-of-ddos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/ddOss-1.jpg\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/ddOss-1.jpg\",\"width\":1000,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/volumetric-ddos-a-widely-used-variant-of-ddos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Volumetric DDoS, A Widely Used Variant of DDoS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"name\":\"Truxgo Server Blog\",\"description\":\"Cloud Server and Hosting Tutorials.\",\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\",\"name\":\"Truxgo Server Blog\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"width\":1250,\"height\":278,\"caption\":\"Truxgo Server Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\",\"name\":\"Truxgo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"caption\":\"Truxgo\"},\"sameAs\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\"],\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/author\\\/truxgo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Volumetric DDoS, A Widely Used Variant of DDoS - Truxgo Server Blog","description":"While we know, DDoS attacks are widely used by criminals, and we will see one that has become popular among criminals called DDoS Volumetric.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/truxgoservers.com\/blog\/volumetric-ddos-a-widely-used-variant-of-ddos\/","og_locale":"es_MX","og_type":"article","og_title":"Volumetric DDoS, A Widely Used Variant of DDoS - Truxgo Server Blog","og_description":"While we know, DDoS attacks are widely used by criminals, and we will see one that has become popular among criminals called DDoS Volumetric.","og_url":"https:\/\/truxgoservers.com\/blog\/volumetric-ddos-a-widely-used-variant-of-ddos\/","og_site_name":"Truxgo Server Blog","article_published_time":"2021-05-16T03:03:09+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/05\/ddOss-1.jpg","type":"image\/jpeg"}],"author":"Truxgo","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Truxgo","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/truxgoservers.com\/blog\/volumetric-ddos-a-widely-used-variant-of-ddos\/#article","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/volumetric-ddos-a-widely-used-variant-of-ddos\/"},"author":{"name":"Truxgo","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e"},"headline":"Volumetric DDoS, A Widely Used Variant of DDoS","datePublished":"2021-05-16T03:03:09+00:00","mainEntityOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/volumetric-ddos-a-widely-used-variant-of-ddos\/"},"wordCount":346,"commentCount":0,"publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/volumetric-ddos-a-widely-used-variant-of-ddos\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/05\/ddOss-1.jpg","keywords":["Cybersecurity","DDOS"],"articleSection":["Cybersecurity","DDOS"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/truxgoservers.com\/blog\/volumetric-ddos-a-widely-used-variant-of-ddos\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/truxgoservers.com\/blog\/volumetric-ddos-a-widely-used-variant-of-ddos\/","url":"https:\/\/truxgoservers.com\/blog\/volumetric-ddos-a-widely-used-variant-of-ddos\/","name":"Volumetric DDoS, A Widely Used Variant of DDoS - Truxgo Server Blog","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/volumetric-ddos-a-widely-used-variant-of-ddos\/#primaryimage"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/volumetric-ddos-a-widely-used-variant-of-ddos\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/05\/ddOss-1.jpg","datePublished":"2021-05-16T03:03:09+00:00","description":"While we know, DDoS attacks are widely used by criminals, and we will see one that has become popular among criminals called DDoS Volumetric.","breadcrumb":{"@id":"https:\/\/truxgoservers.com\/blog\/volumetric-ddos-a-widely-used-variant-of-ddos\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/truxgoservers.com\/blog\/volumetric-ddos-a-widely-used-variant-of-ddos\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/volumetric-ddos-a-widely-used-variant-of-ddos\/#primaryimage","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/05\/ddOss-1.jpg","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/05\/ddOss-1.jpg","width":1000,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/truxgoservers.com\/blog\/volumetric-ddos-a-widely-used-variant-of-ddos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/truxgoservers.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Volumetric DDoS, A Widely Used Variant of DDoS"}]},{"@type":"WebSite","@id":"https:\/\/truxgoservers.com\/blog\/#website","url":"https:\/\/truxgoservers.com\/blog\/","name":"Truxgo Server Blog","description":"Cloud Server and Hosting Tutorials.","publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/truxgoservers.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/truxgoservers.com\/blog\/#organization","name":"Truxgo Server Blog","url":"https:\/\/truxgoservers.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","width":1250,"height":278,"caption":"Truxgo Server Blog"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e","name":"Truxgo","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","caption":"Truxgo"},"sameAs":["https:\/\/truxgoservers.com\/blog"],"url":"https:\/\/truxgoservers.com\/blog\/author\/truxgo\/"}]}},"_links":{"self":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/2737","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/comments?post=2737"}],"version-history":[{"count":2,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/2737\/revisions"}],"predecessor-version":[{"id":2746,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/2737\/revisions\/2746"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media\/2738"}],"wp:attachment":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media?parent=2737"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/categories?post=2737"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/tags?post=2737"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}