The attack’s goal is to saturate the bandwidth of the attacked site, and magnitude is measured in bits per second (Bps). Volume Based Attacks – Includes UDP floods, ICMP floods, and other spoofed-packet floods.Connectionless – An attack that does not require a session to be formally established before a sender (server) can send “data packets” – a basic unit of communication over a digital network – to a receiver (client).Ī DDoS attack can fall into the following three broad categories, depending on the area of the network infrastructure on which the attack is focused:.