All Articles 9 min read
Layer 3 Layer 4 Layer 7 DDoS Explained Network Security Mitigation CoreEdge

Layer 3/4 vs Layer 7 DDoS Attacks: What's the Difference and How to Mitigate Both

DDoS attacks target different layers of the network stack. Layer 3/4 attacks overwhelm bandwidth and infrastructure. Layer 7 attacks exhaust application resources. Learn how they differ and why you need different defenses for each.

CoreTech Research Team
Layer 3/4 vs Layer 7 DDoS Attacks: What's the Difference and How to Mitigate Both

A company’s web server crashes under a DDoS attack. The engineering team investigates: bandwidth utilization is at 5%. CPU is at 100%. The firewall shows no anomalies. Every incoming request is a perfectly valid HTTP GET.

This is a Layer 7 attack — and nine out of ten network engineers’ first instinct would be to look for a volumetric flood that doesn’t exist.

Understanding which layer an attack targets is the difference between deploying the right defense in sixty seconds and spending hours troubleshooting the wrong problem.

The OSI Model in 60 Seconds

The Open Systems Interconnection (OSI) model divides network communication into seven layers. For DDoS, three layers matter:

Layer 3 (Network) handles IP addressing and routing. Every packet has a source IP, destination IP, and protocol identifier. This is where IP-level floods operate.

Layer 4 (Transport) handles TCP and UDP — connection management, port numbers, and flow control. This is where SYN floods, UDP floods, and connection exhaustion attacks operate.

Layer 7 (Application) handles HTTP, DNS, SMTP, and other application protocols. This is where the actual content of communication lives — URLs, headers, cookies, API payloads.

When people say “Layer 3/4 attack,” they mean attacks targeting the network infrastructure itself. When they say “Layer 7 attack,” they mean attacks targeting the application running on that infrastructure.

Layer 3/4 Attacks: The Volume Play

Layer 3/4 attacks are designed to overwhelm bandwidth, exhaust routing capacity, or flood connection tables. They don’t try to look legitimate — they try to be massive.

Common Layer 3/4 Attack Types

AttackLayerProtocolMechanism
UDP Flood3/4UDPMassive volumes of random UDP packets
SYN Flood4TCPHalf-open connections exhaust backlog
DNS Amplification3/4UDPSmall queries → large spoofed responses
NTP Amplification3/4UDPmonlist command → 556x amplification
ICMP Flood3ICMPPing floods saturate bandwidth
ACK Flood4TCPUnsolicited ACK packets waste processing
GRE Flood3GREEncapsulated packets bypass some filters
Fragment Flood3IPFragmented packets exhaust reassembly buffers

Characteristics of Layer 3/4 Attacks

High volume. These attacks are measured in gigabits per second (Gbps) and packets per second (PPS). A typical volumetric attack ranges from 10 Gbps to 500+ Gbps. The largest recorded attacks have exceeded 3 Tbps.

Simple packets. Attack traffic consists of basic network packets — often random payloads, spoofed source IPs, and no application-layer content. A 100-byte UDP packet repeated 10 million times per second is the purest form of Layer 3/4 attack.

Easy to detect. Bandwidth graphs spike dramatically. Packet rates jump from normal to millions per second. Protocol distributions shift (suddenly 99% of traffic is UDP when it’s normally 80% TCP). Detection systems identify these attacks quickly because the statistical anomaly is unmistakable.

Hard to sustain affordably. Generating 100+ Gbps requires significant botnet resources. Attackers either use amplification (turning 1 Gbps into 50 Gbps) or rent large botnets — both of which cost money.

Layer 7 Attacks: The Stealth Play

Layer 7 attacks are designed to exhaust the application’s ability to process requests. Each attack request looks identical to a legitimate user request — the attack volume may be tiny compared to Layer 3/4, but the damage per request is massive.

Common Layer 7 Attack Types

AttackProtocolMechanism
HTTP GET FloodHTTPThousands of requests for resource-heavy pages
HTTP POST FloodHTTPLarge form submissions consuming server processing
SlowlorisHTTPPartial requests held open, exhausting connection slots
Slow POSTHTTPSending POST data one byte at a time
API AbuseHTTP/RESTTriggering expensive database queries via API
DNS Query FloodDNSLegitimate-looking queries for random subdomains
WordPress XmlrpcHTTPPingback requests amplified through WordPress sites

Characteristics of Layer 7 Attacks

Low volume. A devastating Layer 7 attack might generate only 50,000 requests per second — a fraction of the PPS in a volumetric attack. Bandwidth usage may barely register. Your monitoring dashboard shows normal traffic levels while your application is completely unresponsive.

Expensive per request. Each Layer 7 request forces the server to do real work: parse HTTP headers, execute application logic, query databases, render templates, serialize responses. A single HTTP request to a search endpoint might trigger a 500ms database operation. At 10,000 requests per second, that’s 10,000 concurrent database queries.

Protocol-compliant. Layer 7 attack traffic passes every network-level check. It uses valid TCP connections with complete handshakes. HTTP headers are well-formed. URLs are real. User-Agent strings are realistic. The traffic is indistinguishable from legitimate requests at the packet level.

Hard to detect. Because each individual request is legitimate, detection requires understanding application-level patterns: request rates per session, URL distribution, geographic consistency, and behavioral fingerprinting. Traditional network monitoring tools see nothing unusual.

Cheap to launch. Because the attack relies on the target’s own resource consumption (not bandwidth), a small number of attack sources can be devastating. A single server sending 10,000 HTTP requests per second can overwhelm a web application that costs $10,000/month to host.

The Comparison Table

AspectLayer 3/4Layer 7
GoalSaturate bandwidth/connectionsExhaust application resources
Volume10-500+ Gbps0.1-5 Gbps
PPSMillionsThousands to tens of thousands
Packet contentRandom/minimalValid application requests
Source IPsOften spoofedReal IPs (botnets, proxies)
TCP handshakeUsually no (except SYN)Complete
Detection difficultyEasy (statistical)Hard (behavioral)
Mitigation approachPacket filtering, rate limitingRequest analysis, challenge-response
Attacker costHigh (bandwidth expensive)Low (application does the work)
Typical durationMinutes to hoursHours to days
Collateral damageEntire network segmentSpecific application/service

Why You Need Different Defenses

A packet filter that drops 10 million PPS of UDP flood traffic won’t help with 50,000 legitimate-looking HTTP requests per second. A WAF analyzing HTTP headers won’t help when your upstream link is saturated with 200 Gbps of amplification traffic before packets even reach your server.

Layer 3/4 Requires: Packet-Level Filtering at Scale

  • Stateless packet inspection at wire speed
  • Per-source rate limiting on UDP and ICMP
  • TCP flag validation (SYN, ACK, FIN, RST)
  • Protocol filtering (block unused protocols)
  • GeoIP-based traffic reduction
  • Amplification signature detection
  • Sufficient upstream bandwidth to absorb the flood

Layer 7 Requires: Application-Aware Analysis

  • HTTP request rate limiting per source
  • URL pattern analysis (are 10,000 clients requesting the same expensive endpoint?)
  • Challenge-response mechanisms (JavaScript challenges, CAPTCHAs)
  • Session validation (does this “user” have a valid session?)
  • Bot detection (behavioral fingerprinting)
  • API-specific rate limiting and authentication

How CoreTech Handles Both Layers

Layer 3/4: CoreEdge™

CoreEdge™ is purpose-built for Layer 3/4 mitigation. Operating at the XDP layer — the lowest software interception point in the Linux networking stack — it processes every packet at wire speed before the kernel even sees it.

6 firewall actions provide granular control over how traffic is handled:

ActionNameUse Case
0DROPBlock all matching traffic
1ACCEPTWhitelist known-good sources
2RATE_LIMIT_RULEGlobal PPS threshold per rule
3RATE_LIMIT_SRCPer-source PPS threshold
4MATCH_CONNECTIONStateful TCP validation
5CUSTOM_DEFAULTFull protocol-specific tuning (30+ parameters)

For a typical Layer 3/4 attack, mitigation involves:

  1. CoreDetection™ identifies the anomaly within seconds
  2. Automated rules deploy to CoreEdge™
  3. UDP floods are rate-limited per source
  4. SYN floods are validated with MATCH_CONNECTION
  5. Amplification traffic is identified by source-response correlation
  6. GeoIP rules reduce attack surface

Your servers never see the attack traffic. Zero added latency for clean traffic.

Layer 7: Upstream Integration

Layer 7 attacks require application-layer inspection that operates above the packet level. CoreTech’s architecture handles this through:

  • TCP connection validation — MATCH_CONNECTION ensures only fully handshaked connections reach your server, eliminating SYN-based resource waste
  • Per-source connection rate limiting — limits how many new connections a single source can initiate, throttling HTTP flood bots
  • Custom TCP parameterstcp_syn_rate, tcp_non_syn_rate, and tcp_session_limit control connection behavior at the transport layer, providing a first line of defense against application floods

For deep Layer 7 analysis (URL inspection, bot detection, JavaScript challenges), CoreTech integrates with your existing WAF or reverse proxy layer. CoreEdge™ handles the volume; your application security layer handles the sophistication.

Modern Attacks Use Both Layers

The most sophisticated DDoS campaigns combine Layer 3/4 and Layer 7 techniques simultaneously. While a 200 Gbps UDP flood saturates your bandwidth and distracts your network team, a concurrent Layer 7 HTTP flood targets your login endpoint with credential-stuffing payloads.

This multi-vector approach is why single-layer defenses fail. You need packet-level filtering AND application-level analysis. You need bandwidth capacity AND intelligent request inspection. You need automation at both layers because human response time can’t match multi-vector attack speed.

CoreDetection™ classifies attacks by layer and vector simultaneously, deploying the appropriate CoreEdge™ rules for each component of a multi-vector campaign. The behavioral engine doesn’t just detect “an attack” — it identifies each vector independently and applies targeted mitigation for each.

10-day free trial — full Layer 3/4 mitigation with CoreEdge™, CoreDetection™ behavioral analysis, and self-service firewall management.

Get started now →

Tags: Layer 3 Layer 4 Layer 7 DDoS Explained Network Security Mitigation CoreEdge

Want to see this in action?

Get a live demonstration of CoreTech's DDoS mitigation platform.