Resource attack/Definition: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (New page: <noinclude>{{Subpages}}</noinclude> Malware that overwhelms processing, memory, or network resources of a computer system by sending large numbers requests that appear legitimate, but ...) |
imported>Howard C. Berkowitz No edit summary |
||
Line 1: | Line 1: | ||
<noinclude>{{Subpages}}</noinclude> | <noinclude>{{Subpages}}</noinclude> | ||
[[Malware]] that overwhelms processing, memory, or network | [[Malware]] that overwhelms processing, memory, or network resources of a computer system by sending large numbers requests that appear legitimate, but at a high rate or in some manner crafted to make resources unavailable | ||
resources of a computer system by sending large numbers requests that appear legitimate, but at a high rate or in some manner crafted to make resources unavailable |
Latest revision as of 19:09, 22 February 2009

Malware that overwhelms processing, memory, or network resources of a computer system by sending large numbers requests that appear legitimate, but at a high rate or in some manner crafted to make resources unavailable