Limiting efficacy of denial of service attack by increasing client resource demands
A denial-of-service attack, denial-of-service technology, applied in the direction of electrical digital data processing, transmission systems, instruments, etc., can solve problems such as unavailability, the target device cannot respond, and the response is slow.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0011] The detailed description of the following example implementations refers to the accompanying drawings. The same reference numbers in different drawings may identify the same or similar elements.
[0012] An attacker such as a hacker may use a Denial of Service (DoS) attack such as a Distributed Denial of Service (DDoS) attack (e.g., a DoS attack from more than one client device) in an attempt to make a network device unavailable to the intended user of the network device , or to reduce the availability of network equipment to respond to requests from users. For example, an attacker could use a botnet to cause a large number of client devices to send requests to network devices. Network devices can be overwhelmed with requests, which can reduce the ability of the network device to respond to legitimate requests. DoS attacks utilizing botnets may be computationally inexpensive for client devices compared to network devices. For example, the client device may require le...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


