Skip to main content

DDoS ↔ attack to flood Server with wasteful reqs to disrupt legitimate access, often via Botnet

aka DDoS, DDoS-Attack, Distributed-Denial-of-Service-Attack

HTTP Flood

DDoS spam lots of concurrent HTTP Reqs to overload server - camoflauge attacks by varying UA & IPs

DDoS Protection

strategies to detect/mitigate DDoS

Botnet

army of internet connected devices to perform DDoS

References

  1. Botnet ↔ army of internet connected devices to perform DDoS

  2. DDoS Protection ↔ strategies to detect/mitigate DDoS

  3. HTTP FloodDDoS spam lots of concurrent HTTP Reqs to overload server - camoflauge attacks by varying UA & IPs