DDoS attack depends which Layer the recovery time depends on it.
Layer | Application | Description | Vector Example | |
7 | Application | Data | Network process to application | HTTP floods, DNS query floods |
6 | Presentation | Data | Data representation and encryption | SSL abuse |
5 | Session | Data | Interhost communication | N/A |
4 | Transport | Segments | End-to-end connections and reliability | SYN floods |
3 | Network | Packets | Path determination and logical addressing | UDP reflection attacks |
2 | Datalinks | Frames | Physical addressing | N/A |
1 | Physical |