Internet pipe saturation
These attacks are volumetric floods and often involve flooding the target with an overwhelming bandwidth. Common attacks utilize UDP as it is easily spoofed and difficult to mitigate downstream. Out of state, SYN floods and malformed packets are also often seen. While many attacks aim at saturating inbound bandwidth, it’s not uncommon for attackers to identify and pull large files from websites, ftp shares, etc. in order to saturate outbound bandwidth as well.