DDoS attacks overwhelm a target with either too many connection requests or too much bandwidth. The intended result is to make the target inaccessible, although other infrastructure elements (routers, switches, load balancers, etc.) may suffer collateral damage along the path of an attack. This paper looks at how these attacks can be avoided to ensure a safe and secure system.
Jon Collins’ in-depth look at tech and society
Phil Muncaster reports on China and beyond