What is a Volumetric Attack?
A volumetric attack is a type of distributed denial-of-service (DDoS) that tries to consume all available bandwidth (or fill links and state tables) so legitimate traffic cannot reach the target. The method is brute force: send more bits per second than the target or its upstream can carry.
Table of Contents
How volumetric attacks generate volume
Attackers almost never use one PC. They use a bot network or stress-for-hire services so thousands of sources hit the victim at once. Common vectors include:
- UDP floods: High packet rates to many ports; the host and network spend resources handling junk.
- ICMP floods: Mass echo requests and replies that saturate links in both directions.
- Reflection and amplification: The attacker sends small requests to third-party servers with a spoofed source IP (the victim’s). Large responses flood the victim. DNS, NTP, and misconfigured services have been frequent amplifiers.
Mitigation typically involves upstream ISP or cloud scrubbing centers, BGP diversion, rate limits, and filtering obvious abuse patterns before they reach the application.
Volumetric vs. application-layer DDoS
Volumetric attacks target capacity at the network edge. Application-layer (Layer 7) attacks can use far less bandwidth but still take sites down by exhausting CPUs or databases. Large campaigns sometimes combine both: a loud volumetric wave distracts staff while a quieter Layer 7 stream hits login or API paths.
Relevance to marketing, publishers, and fraud
When sites or DNS go offline, paid campaigns and organic visits fail together. Publishers lose ad impressions; e-commerce loses sales during peaks. Volumetric attacks can also produce ugly cloud bandwidth bills if attack traffic is metered.
The link to click fraud is mostly indirect: both problems involve scaled, distributed traffic, but DDoS aims at outage, not ad billing. Still, teams that run high-profile sales or controversial brands should plan DDoS response alongside ad fraud controls. Understanding volumetric floods also clarifies why “more traffic” on a graph is not automatically good traffic. For deeper background on automated traffic at scale, see types of bots on the ClickPatrol blog.
