Teardrop Attack
A DDoS attack carried out using fragmented packets with an offset, based on exploiting a TCP/IP stack vulnerability.
A DDoS attack carried out using fragmented packets with an offset, based on exploiting a TCP/IP stack vulnerability.
Creating a virtual channel for data exchange between two Internet-connected networks by way of encapsulating traffic inside the IP protocol.
HTTP is the World Wide Web protocol used for data communication between web servers and clients.
A network protocol used in small-sized networks, such as residential ones, for advertising and discovery of network services, primarily the ones supported by the Universal Plug-and-Play (UPnP) architecture. Features of SSDP are used in DDoS attacks belonging to the SSDP amplification type.
A transport layer protocol in the OSI model, one of the main protocols of the Internet protocol suite.
SSL is a protocol for cryptographically secure data exchange using popular Internet protocols. SSL certificates are used to verify that a public key belongs to its actual owner.
A mechanism that forces a web client and server to establish an HTTPS-based secure connection at once, without first using the unprotected HTTP protocol. The approach helps to minimize the risk of attacks aimed at wiretapping or tampering with a web connection.
A protocol for sending messages (datagrams) to other hosts without error checking or correction. UDP offers the advantage of being able to quickly process requests from very large number of clients.
A system that keeps the information about Internet domains, with its key function being to provide the IP address of a node or other resource upon receiving its full domain name. The system consists of multiple servers and has a distributed hierarchical architecture. In order to minimize DNS hacking attack risks and ensure the integrity and authenticity of data kept by DNS, its servers use built-in protection and security features, such as DNSSEC, TSIG, DANE, and others.