5 Resources to Exhaust
A DDoS attack exhausts a finite resource. There are exactly 5 resources to exhaust. Every attack in existence targets one of them. Lower levels need more volume. Higher levels need less, but hit harder.
The HTTP Version Multiplier
The same 10,000 requests per second looks like 10,000 connections on HTTP/1.0 but only 10 on HTTP/2. Firewalls that count connections are blind to the 100 streams multiplexed inside each one.
23 Core Mechanisms
Every attack in the 233-entry taxonomy reduces to one of 23 fundamental server-side effects. The industry groups them into 3 marketing categories. We decompose them into 23 because each needs different detection and different mitigation.
Where Defenses Are Blind
Combining target level with HTTP version reveals exactly where standard defenses cannot see. Red cells are blind spots that most vendors cannot detect.
The Complete DDoS Formula
Every DDoS attack in history decomposes into these 5 components. Hover each term to understand its contribution to deadliness.
The Protocol Paradox
Better protocols are simultaneously harder to overwhelm AND introduce new attack surfaces. Empirical testing (IIS on GCP) showed HTTP/1.1 dies at 2,500 RPS while HTTP/2 survives to 10,000 RPS - a 4x resilience boost. But HTTP/2 enables Rapid Reset, which no vendor in our test detected.
Vendor Protection Reality
We tested 10 major CDN/WAF vendors with gentle probes (50 RST_STREAM cycles, 20 PINGs, 5 stream holds, Slowloris drip). These are the actual results from April 2026.
| VENDOR | RST DETECT | PING LIMIT | STREAM HOLD | SLOWLORIS | DOWNGRADE | H3/QUIC | TLS ms |
|---|