3 - Army Technology
Join Our Newsletter - Get important industry news and analysis sent to your inbox – sign up to our e-Newsletter here
X

2007: When Cyberwarfare Came of Age

3
To overcome servers that are designed to handle volume, DDoS attacks must create huge torrents of messages in short timeframes. Small numbers of computers cannot generate the necessary volume, and if they could, network firewalls would simply reject on sight all messages bearing the IP addresses of the few culprit computers.