Slowloris (Session Attacks)
Slowloris is a type of DoS attack that aims to flood a targeted server with incomplete HTTP requests.
Blog
Company and industry news, educational articles
Success Stories
Articles with customer case studies
How StormWall Works
Explore how our services can protect infrastructure from any type of attack
Technology
How StormWall DDoS protection works
How to Connect
Instructions for launching DDoS protection
API
Automate management of StormWall DDoS protection
Knowledge Base
Cybersecurity terms and definitions
StormWall for Web
DDoS protection for web applications
StormWall for Networks
DDoS protection for networks via BGP
StormWall for Servers
DDoS protection for TCP/UDP Servers
Web Application Firewall (WAF)
Protecting web applications with a cloud‑based security tool
Content Delivery Network (CDN)
CDN service to speed up content loading
Virtual Dedicated Servers (VDS/VPS)
VDS/VPS servers with DDoS protection
Anti-DDoS Hosting
Hosting and DDoS protection combined
Blog
Company and industry news, educational articles
How StormWall Works
Explore how our services can protect infrastructure from any type of attack
Success Stories
Articles with customer case studies
Technology
How StormWall DDoS protection works
How to Connect
Instructions for launching DDoS protection
API
Automate management of StormWall DDoS protection
Knowledge Base
Cybersecurity terms and definitions
StormWall Partner Program
For resellers and service providers
White Label
Use StormWall DDoS protection under your brand
Affiliates
Attract clients to protect sites from DDoS - and increase your income
About StormWall
Learn more about our company, see contact details and terms of service
Our Clients
Companies protected by us over the years
Media
Articles featuring our company
Why StormWall
Why StormWall
Slowloris is a type of DoS attack that aims to flood a targeted server with incomplete HTTP requests.
DoS attacks against TCP servers that exploit vulnerabilities in TCP-SYN session closure: a server overload is achieved by sending a flood of forged RST or FIN packets.
A type of DoS attack targeting network equipment, a variant of ICMP flood attack.
A DoS attack against a victim server, carried out by sending a huge flood of forged ICMP packets from multiple IP addresses.
A flag for sequence number synchronization that uses bits 10 to 15 of the TCP packet header.
SYN/ACK flood is a type of DoS attack targeting TCP servers that involves sending spoofed packets with both SYN and ACK flags set, which causes a server overload.