Detailed Notes on DDoS attack
Very simple attacks which include SYN floods may possibly show up with a wide range of supply IP addresses, giving the looks of the distributed DoS. These flood attacks don't call for completion of your TCP 3-way handshake and try and exhaust the spot SYN queue or even the server bandwidth. Because the source IP addresses can be trivially spoofed,