Hackers, criminals, and political "hactivists" have increasingly turned to distributed denial of service (DDoS) attacks to disrupt access to or even take down legitimate Web sites.
This white paper describes DDoS attack methods such as powerful DDoS attacks originating from servers, and new, advanced application DDoS attacks.
It then lays out four simple steps that organisations can undertake to mitigate DDoS attacks.
Share