Small-scale attacks designed to slip through “coarse” filters. They target specific application functions, such as an expensive database search, to cause a “zombie” state.
Small-scale attacks designed to slip through “coarse” filters. They target specific application functions, such as an expensive database search, to cause a “zombie” state.