DDoS: Detection and Response
The bogeyman, the monster under the bed, the creature lurking in the darkness waiting to pounce…
That’s what it feels like we have made Denial of S...
Published May 15, 2012
Version 1.0jwham20
Nimbostratus
Joined November 08, 2011
Joon_Ho_7885
May 18, 2012Historic F5 Account
@Josh,
I meant two kinds of attacks.
One is TCP SYN Flooding attack and another is HTTP GET Flooding attack separately.
Yes, you are right. About HTTP GET Flooding attack, TCP SYN cookie is not a workaround because HTTP GET packet is sent to server after TCP-3W-Handshaking process.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)