3 - Army Technology
Join Our Newsletter - Get important industry news and analysis sent to your inbox – sign up to our e-Newsletter here

2007: When Cyberwarfare Came of Age

To overcome servers that are designed to handle volume, DDoS attacks must create huge torrents of messages in short timeframes. Small numbers of computers cannot generate the necessary volume, and if they could, network firewalls would simply reject on sight all messages bearing the IP addresses of the few culprit computers.