O'Reilly logo

Implementing Cisco Networking Solutions by Harpreet Singh

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Preventing denial of service attacks

Some of the attacks are typically done with the objective of making services unavailable. This can be done by sending a lot of traffic to a destination and choking the link bandwidth to the attacked machine, resulting in a Denial of Service (DoS) attack. Sometimes, multiple hosts may be used to attack in a Distributed Denial of Service (DDoS) attack. These DoS/DDoS attacks could be pure volumetric attacks to generate a lot of traffic for a particular host and rely on the underlying network infrastructure routing to route packets towards that host and choke the bandwidth to the host or the host itself of the processing resources on the host. Some other attacks attack the actual application, and are called ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required