Five DDoS attack tools that you should know about

9/10

Threat landscape of DDoS attacks

Source:  blog.radware.com

2011 saw a surge of DDoS attacks, surpassing all previous records. Surprisingly a majority of these distributed denial-of-service attacks were not attributed to bandwidth constraints. In the accompanying graph it is clearly seen that network-based DoS attacks were less than application-level DDoS attacks.  A majority of the attacks exploited the HTTP and its sibling HTTPS protocols. Attackers realize that volumetric attacks can be mitigated by use of scrubbers on the cloud, so they opt for slow and low DoS attacks, choosing applications as the target instead of networks.

View All Photo Stories

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close