Advances, Systems and Applications
Target part of the intrusion | Origin of the intrusion |
---|---|
Application layer | Bruteforce; XSS; SQL injection; Fuzzers; DoS flood; DoS slowloris |
Network layer | Bruteforce; DoS based amplification; DoS synflood; Unsolicited traffic; Backdoor |