@michellelollie Not really - they can be anything from identifying a vulnerability in a particular service which causes it to shut down or become swamped to simple floods of traffic to unmonitored services. The latter typically requires some form of asymmetric behavior on the server in order for a single system to manage to take the service/system offline -- something like a time/resource intensive database search, etc.
They're an extremely broad category of attack.