Search

HTTP Flood


When executing an HTTP Flood DDoS attack, an adversary sends ostensibly legitimate GET or POST requests to a server or web application, siphoning off most or all of its resources. This technique often involves botnets consisting of “zombie” computers previously contaminated with malware.


Read more at Woods LLP

13 views0 comments

Recent Posts

See All