Flood Attacks
Title: Flood Attacks
Category: /Science & Technology
Details: Words: 285 | Pages: 1 (approximately 235 words/page)
Flood Attacks
Category: /Science & Technology
Details: Words: 285 | Pages: 1 (approximately 235 words/page)
showed first 75 words of 285 total
You are viewing only a small portion of the paper.
Please login or register to access the full copy.
Please login or register to access the full copy.
showed last 75 words of 285 total
The router acts as a transparent TCP proxy between the real server, and the client. When a connection request is made, the router completes the handshake for the server, and opens the real connection only after the handshake is completed. The router also places a threshold on the amount of connection requests it handles. If the amount of half-open connections exceeded the threshold it lowers the timeout period interval, thus dropping the half-open connections faster.