top of page
Search

Misused Application Attack


Instead of using spoofed IP addresses, this attack parasitizes legitimate client computers running resource-intensive applications such as P2P tools. Crooks reroute the traffic from these clients to the victim server to bring it down due to excessive processing load. This DDoS technique is hard to prevent as the traffic originates on real machines previously compromised by the attackers.


Read more at Woods LLP

11 views0 comments

Recent Posts

See All
bottom of page