|
There are two main methods for bandwidth consumption attacks:
- Attackers may have a larger network connection than the victim. The attacker can simply overwhelm the victim's network from his own, which may or may not be a compromised site.
- Attackers may use multiple unsuspecting sites to overwhelm the victim's network. The hacker can successfully perform a DoS attack against a T3 connection while having only a 56K connection.
|