A cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable, disrupting services of a host connected to the Internet, by overloading the system with requests so that legitimate requests cannot be served.

More cool relevant articles:

Advertisement:
Advertisement: