Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Misused Application Attack

Instead of using spoofed IP addresses, this attack parasitizes legitimate client computers running resource-intensive applications such as P2P tools. Crooks reroute the Traffic from these clients to the victim server to bring it down due to excessive processing load. This DDoS technique is hard to prevent as the traffic originates on real machines previously compromised by the attackers.

Read more at Woods LLP



This post first appeared on Woods LLP, please read the originial post: here

Share the post

Misused Application Attack

×

Subscribe to Woods Llp

Get updates delivered right to your inbox!

Thank you for your subscription

×