1. Volume-based Attacks: These aim to saturate the bandwidth of the target. 2. Protocol Attacks: These exploit weaknesses in protocols to consume server resources. 3. Application Layer Attacks: These target the application layer to exhaust resources and disrupt service.