Is there any type of DDoS where closing or taking full control of all port capabilities would be useful in mitigation of an attack?
I have written software that allows for total control of ports, meaning within my network I can open, close or redirect traffic from and to any port I enter into the command.
I recall one situation where a STP was misconfigured and they closed ports thinking they were under a DoS or DDoS attack, and the result was they DoS'd themselves since each RQST to a branch of the tree further clogged their network.
Which situation would my software be helpful in terms of mitigation?
Aucun commentaire:
Enregistrer un commentaire