DDoS attack depends which Layer the recovery time depends on it.
| Layer | Application | Description | Vector Example | |
| 7 | Application | Data | Network process to application | HTTP floods, DNS query floods |
| 6 | Presentation | Data | Data representation and encryption | SSL abuse |
| 5 | Session | Data | Interhost communication | N/A |
| 4 | Transport | Segments | End-to-end connections and reliability | SYN floods |
| 3 | Network | Packets | Path determination and logical addressing | UDP reflection attacks |
| 2 | Datalinks | Frames | Physical addressing | N/A |
| 1 | Physical |