Denial of service attacks split by what they exhaust.
Volumetric attacks saturate the target's upstream bandwidth. The attack volume is measured in bps (sometimes pps for packet rate). UDP flood, ICMP flood and amplified reflection attacks fall here. Reflection/amplification is the high-leverage technique: the attacker sends a small spoofed-source query to a misconfigured service (DNS open resolver, NTP monlist, memcached UDP, SSDP) and the service sends a much larger reply to the spoofed victim. The amplification factor is the ratio of reply to query: DNS ANY queries amplify roughly 28x to 54x; NTP monlist amplifies 500x to 580x; memcached amplifies up to 51,000x and was responsible for the 1.35 Tbps GitHub attack in February 2018 and the 1.7 Tbps NetScout attack in March 2018.
Protocol attacks exhaust state on stateful boxes (load balancers, firewalls, application servers). SYN flood sends TCP SYNs without completing the handshake; the target holds half-open connection state until the SYN backlog fills. Mitigation: SYN cookies (Linux tcp_syncookies), which encode the connection state in the SYN-ACK sequence number so no backlog is needed. Fragmentation attacks send overlapping or oversized IP fragments that confuse reassembly (Teardrop, Ping of Death; mostly dead since the 2000s but resurface on poorly maintained embedded stacks).
Application-layer attacks exhaust application resources at low bandwidth. Slowloris opens many HTTP connections and sends partial headers, never finishing the request; a single laptop on a 10 Mbps link can take down an unhardened Apache server. HTTP GET flood uses real-looking GET requests to fetch expensive resources (search pages, dynamic reports); a botnet of compromised home routers serves the requests, and the target cannot distinguish them from legitimate users without rate limiting or behavioural fingerprinting.
The botnet of record is Mirai (Anna-Senpai source code release, September 2016), which compromised IoT devices (DVRs, IP cameras, home routers with default Telnet credentials) and produced the September 2016 attacks against Krebs on Security (around 620 Gbps), OVH (around 1 Tbps), and the October 2016 Dyn attack (1.2 Tbps) that took Twitter, Reddit, GitHub and Spotify offline for hours.
Social engineering, phishing, zero-days and the insider threat
The human is still the cheapest exploit.
Technical attacks ride on top of human ones. Phishing at network scale comes in several shapes. Spear phishing targets a named individual using their context (their boss's writing style, their HR portal's branding). Whaling targets executives. Smishing is phishing over SMS, and on Indian carriers it remains the dominant vector for OTP harvesting and UPI fraud routed through the I4C 1930 helpline. Phishing kit hosting is the network-layer artefact: a kit deployed on a compromised hosting account at a small Indian provider, fronted by a freshly registered look-alike domain on
.inor.co.in. The kit collects credentials and POSTs them to a Telegram bot for live operator follow-up. CERT-In's quarterly Phishing Activity Trends advisories list the most-impersonated brands; in 2024-2025 those were SBI, HDFC Bank, Axis Bank, India Post, IRCTC and the Income Tax e-filing portal.Social engineering without phishing covers pretexting (the attacker calls posing as a vendor or auditor with a story that justifies an information request), baiting (the attacker leaves a USB stick labelled "Payroll 2026" in a parking lot), tailgating (physically following an employee through a secure door), and quid pro quo (the attacker offers help in exchange for a credential). Indian call-centre cybercrime rings, especially the Jamtara cluster operating across Jharkhand and West Bengal, run pretexting and quid pro quo at industrial scale; NCRB's Crime in India annual report consistently ranks Jharkhand among the highest per-capita cyber-fraud districts.
Zero-day exploits are bugs unknown to the vendor, sold or used before a patch exists. Bug bounty platforms (HackerOne, Bugcrowd, YesWeHack, India's own NCIIPC Responsible Vulnerability Disclosure Programme) pay researchers for coordinated disclosure. CVE assignment is the MITRE-coordinated identifier; NVD at NIST publishes the CVSS scores. CISA KEV (Known Exploited Vulnerabilities) is the catalogue of CVEs proven to be actively exploited; as of May 2026 it lists over 1100 entries. The Indian equivalent advisory channel is CERT-In's vulnerability notes (CIVN series). Examples of high-impact recent CVEs: CVE-2021-44228 (Log4Shell, JNDI lookup in Log4j), CVE-2022-0847 (Dirty Pipe, Linux kernel pipe write), CVE-2024-3094 (XZ Utils backdoor in liblzma).