The IT Law Wiki

Protocol exploitation

32,080pages on
this wiki
Add New Page
Add New Page Talk0

Definition Edit

Protocol exploitation is

a form of denial-of-service attack in which an attacker sends a succession of requests to a target's system in an attempt to consume enough server resources (e.g. TCP ports) to make the system unresponsive to legitimate traffic.[1]

References Edit

  1. Threat Landscape and Good Practice Guide for Internet Infrastructure, at 15.

Also on Fandom

Random Wiki