corero.com

Woonplaats:1
Upvotes received0
Downvotes received1
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (27)

1

0 Thumbs up   0 Thumbs down

outdated


browser. Please upgrade your browser to improve your experience.
Source: corero.com

2

0 Thumbs up   0 Thumbs down

UDP Flood


In a UDP Flood, DDoS attackers send highly-spoofed UDP packets at a very high packet rate using a large source IP range. The victim's network (routers, firewalls, IPS/IDS, SLB, WAF and/or servers) is overwhelmed by the large number of incoming UDP packets. This attack normally consumes network resources and available bandwidth, exhausting t [..]
Source: corero.com

3

0 Thumbs up   0 Thumbs down

ICMP Flood


In an ICMP Flood, attackers send highly-spoofed ICMP packets at large enough volumes to flood a network. The victim's network resources are overwhelmed by the large number of incoming ICMP packets. The attack consumes resources and available bandwidth, exhausting the network until it goes offline. ICMP floods can overwhelm a network with pa [..]
Source: corero.com

4

0 Thumbs up   0 Thumbs down

Ping flood


In a Ping Flood, attackers use "ping" which is a variant of an ICMP and send highly-spoofed ping (IMCP echo requests) packets at a very high rate and from random source IP ranges or as the IP address of the victim.  Attackers can consume all available network resources and bandwidth exhausting the network until it goes offline. Si [..]
Source: corero.com


To view all 27 definitions, please sign in.