Peer to Peer Attack


Peer-to-Peer attacks exploit the fabric of peering technology to perform attacks. These attacks distinguish themselves from other types of attacks because of the following:

1. Attacker doesn't have to communicate with the clients for subversion and

2. The automated nature of Peer-to-Peer technology can allow for BOT like amplification of an attack with the permission of the victim.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center
CyberPedia