Reflection attacks use well-connected servers to reflect and amplify a DDoS attack. Figure 19-5 illustrates a reflection attack. Figure 19-5 DDoS Reflection Attack A DDoS reflection attack proceeds in two
Reflection attacks use well-connected servers to reflect and amplify a DDoS attack. Figure 19-5 illustrates a reflection attack. Figure 19-5 DDoS Reflection Attack A DDoS reflection attack proceeds in two