DDoS attack Options
Botnets are utilized to send DNS requests. If your attacker wished to concentrate on a DNS server, it would use every one of the botnet zombies in his community to issue DNS ask for messages for an amplification file from open recursive DNS servers that translate domain names into IP addresses.DDoS mitigation and defense requires a multi-pronged me