Platform
Platform Overview
How real-time inline DDoS protection works
Hybrid Deployment
Start on-prem, scale to cloud on demand
On-Premises Deployment
Full control within your own environment
Who We Protect
ISPs & Telcos
Protect your network and monetise DDoS-as-a-Service
Hosting & Cloud Providers
Deliver clean pipe to every customer
Enterprises
Always-on availability for critical infrastructure
SaaS Providers
Protect self-hosted platforms at scale
Partners
Partner Program
How the program works and how to join
Strategic Alliances
Akamai, Juniper and technology partners
Partner Portal
Log in to access partner resources
Resources
About
Why Corero
Our approach, differentiation and story
Leadership
Meet the team
Newsroom
Press releases and media coverage
Investor Relations
Financial reports, regulatory news, governance
Careers
Open roles and life at Corero
Contact
Get in touch with the team
Get a Demo
Platform
Platform Overview
Hybrid Deployment
On-Premises Deployment
Who We Protect
ISPs & Telcos
Hosting & Cloud Providers
Enterprises
SaaS Providers
Partners
Partner Program
Strategic Alliances
Partner Portal
Resources
About
Why Corero
Leadership
Newsroom
Investor Relations
Careers
Contact
Get a Demo
Glossary
This glossary provides high-level overviews of various DDoS attack types and well-known attacks.
A
Account Takeover (ATO) Fraud
ACK Attack or ACK-PUSH Flood
Advanced DDoS Attack Techniques
Amplification Attack
API Security
Application Security
ARP Poisoning
ARP Spoofing
B
Booter/Stresser Site
C
Carpet Bombing
D
DNS Amplified (Reflective)
DNS Flood
DNS Water Torture
E
Excessive Verb – Single Session
F
Fake Session Attack
Fraggle Attack
Fragmented ACK Flood
G
GRE Attack
H
HTTP Flooding
HTTP Fragmentation
HTTPS
I
ICMP Flood
ICMP Fragmentation Flood
IP NULL
J
K
L
M
Memcached Attack
Meris Botnet
Mirai Botnet
Multiple Verb – Single Request
N
Network Traffic Monitoring
Non-Spoofed UDP Flood
NTP Amplified (Reflective)
NTP Flood
NTP Flood
O
Other Amplified Attacks (Reflective)
P
Ping Flood
Q
R
Random Recursive GET
Recursive GET
Reflection Attack
RST/FIN Flood
S
Same Source/Dest Flood (LAND Attack)
Scrapers
Slow Read Attack
Slow Session Attack
Slowloris Attack
Smurf Attack
Specially Crafted Packet
Spread Spectrum
SSDP Amplified (Reflective)
SYN Flood
SYN-ACK Flood
T
TCP Null
TLS
TOS Flood
U
UDP Flood
UDP Fragmentation
V
Volumetric Attack
W
X
Y
Z