![]() ![]() ![]() Syn Flood and Ping of Death are some examples. Such attacks use all the processing power of the victim or other crucial resources (a firewall, for instance) and cause service disruptions. Protocol Based Attacks focus on exploiting a weakness in Layers 3 or 4 of the protocol stack. An example of this is the HTTP Flood attack. These attacks are difficult to detect and mitigate. They establish a connection with the target and then exhaust server resources by monopolizing transactions and processes. These attacks exploit a weakness within the Layer 7 protocol stack. DoS or DDoS attacks are designed to cause enough network or server resources to be unresponsive to legitimate requests.Īpplication Layer Attacks go after web applications, and often use the most sophistication.
0 Comments
Leave a Reply. |