Slow DROP Attack
April 28, 2020
Uncategorized
Slow DROP attack works by establishing numerous connections with the server and strategically dropping HTTP responses and forcing the server to resend the packets. The attacker simulates a weak wireless connection by randomly dropping packets in the response and creating an environment where response packets are likely to be lost. This steady stream of low volume traffic makes this attack difficult to distinguish from legitimate traffic. In this way the attacker forces the targeted web server to keep resending missing data packets as long as attacker’s request is fulfilled which also cause legitimate connections to drop. Fig. depicts this attack.
An has alterum nominavi. Nam at elitr veritus voluptaria. Cu eum regione tacimates vituperatoribus, ut mutat delenit est. An has alterum nominavi.