Flood Attacks

Title: Flood Attacks
Category: /Science & Technology
Details: Words: 285 | Pages: 1 (approximately 235 words/page)
Flood Attacks
showed first 75 words of 285 total…
You are viewing only a small portion of the paper.
Please login or register to access the full copy.
…showed last 75 words of 285 total…The router acts as a transparent TCP proxy between the real server, and the client. When a connection request is made, the router completes the handshake for the server, and opens the real connection only after the handshake is completed. The router also places a threshold on the amount of connection requests it handles. If the amount of half-open connections exceeded the threshold it lowers the timeout period interval, thus dropping the half-open connections faster.

Need a custom written paper?