Low Rate Attack


Attack aimed at bringing a target down but doing so quietly. This is much different than high rate brute force attacks. These attacks often aim at leaving connections open on the target by creating a relatively low number of connections over a period of time and leaving those sessions open for as long as possible. Common methods include sending partial http requests, such as Slowloris, and Slowpost (a DDoS tool which completes the handshake) and sending small data packets or keep alives in order to keep the session from going to idle timeout. These attack vectors are often intermingled with the high rate volumetric attacks and fly under the radar making them not only very hard to block but also to detect.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center
CyberPedia