An Online Encyclopedia Of Cyberattack and Cybersecurity Terms

Security Research Center

Internet pipe saturation

These attacks are volumetric floods and often involve flooding the target with an overwhelming bandwidth. Common attacks utilize UDP as it is easily spoofed and difficult to mitigate downstream. Out of state, SYN floods and malformed packets are also often seen. While many attacks aim at saturating inbound bandwidth, it’s not uncommon for attackers to identify and pull large files from websites, ftp shares, etc. in order to saturate outbound bandwidth as well.

DDoSPedia Index

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support

Get Social

Connect with experts and join the conversation about Radware technologies.

Radware Blog
Security Research Center