When it comes to Distributed Denial of Service (DDoS) attacks, there are many techniques and attack vectors used by cybercriminals. However, many of the terms are used interchangeably. Generally speaking, attack vectors leverage vulnerable infrastructure and services available openly on the Internet; for example, common vectors are network protocols such as SSDP (Simple Service Discovery […]
The post How Is it Possible to Defend Against Zero-Day DDoS Attacks? appeared first on Corero.