5 Easy Facts About DDoS attack Described
Botnets are utilized to send DNS requests. In the event the attacker planned to concentrate on a DNS server, it would use the many botnet zombies in his network to difficulty DNS request messages for an amplification record from open recursive DNS servers that translate area names into IP addresses.ICMP floods are distinguished from smurf attacks i