Fingerprinting a DDoS Attack

shared by InfographicMarketing on Sep 17, 2013 in Computers

321 views

0 faves

0 shares

0 comments

Hundreds of millions of data points pour into a DDoS mitigation platform in real-time. Prolexic’s human mitigation method allows for potent distillation for clear and effective results with a highly...
Category: Computers
Did you work on this visual? Claim credit!

Embed Code

Embeded for hosted site:

Click the code to copy
<div class='visually_embed'><img class='visually_embed_infographic' src='https://visual.ly/node/image/86806?_w=540' alt='Fingerprinting a DDoS Attack' /><div class='visually_embed_cycle'></div><script type='text/javascript' src='https://a.visual.ly/api/embed/86806?width=540' class='visually_embed_script' id='visually_embed_script_86806'></script><p> From <a href='https://visual.ly?utm_source=content-embed&utm_medium=embed'>Visually</a>.</p></div>

Embeded for wordpress.com:

Click the code to copy
<div class='visually_embed'><iframe width='1' height='1' style='width: 1px !important; height: 1px !important; position: absolute;left: -100px !important;' src='https://visual.ly/track.php?q=https://visual.ly/community/infographic/computers/fingerprinting-ddos-attack&slug=communityinfographiccomputersfingerprinting-ddos-attack'></iframe><a href="https://visual.ly/community/infographic/computers/fingerprinting-ddos-attack/?utm_source=visually_embed"><img class='visually_embed_infographic' src='https://visual.ly/node/image/86806?_w=540' alt='Fingerprinting a DDoS Attack' /></a><div class='visually_embed_cycle'></div><p> From <a href='https://visual.ly?utm_source=content-embed&utm_medium=embed'>Visually</a>.</p></div>
Customize size