D-Link DFL-860E Инструкция по эксплуатации онлайн [336/552] 17562

D-Link DFL-860E Инструкция по эксплуатации онлайн [336/552] 17562
A more sophisticated form of DoS is the Distributed Denial of Service (DoS) attack. DDoS attacks
involve breaking into hundreds or thousands of machines all over the Internet to installs DDoS
software on them, allowing the hacker to control all these burgled machines to launch coordinated
attacks on victim sites. These attacks typically exhaust bandwidth, router processing capacity, or
network stack resources, breaking network connectivity to the victims.
Although recent DDoS attacks have been launched from both private corporate and public
institutional systems, hackers tend to often prefer university or institutional networks because of
their open, distributed nature. Tools used to launch DDoS attacks include Trin00, TribeFlood
Network (TFN), TFN2K and Stacheldraht.
6.6.10. Distributed DoS Attacks Chapter 6. Security Mechanisms
336

Содержание

Скачать
Случайные обсуждения