What are Distributed Denial of Service (DDoS) attacks?
If using one computer to launch an attack against your target works, well using 50, or 5,000 computers is probably going to work that much better (and enable the attacker to go “elephant hunting” for things like Yahoo!). It also allows the attacker to take a step or more back from the actual machines executing the attacks, making it more difficult to trace them. http://www.all.net/books/dca/top.html http://www2.axent.com/swat/news/ddos.htm http://www.cert.org/reports/dsit_workshop.pdf http://www.research.att.com/~smb/talks/nanog-dos/index.htm http://www.icsa.net/html/communities/ddos/index.shtml http://xforce.iss.net/alerts/advise43.
If using one computer to launch an attack against your target works, well using 50, or 5,000 computers is probably going to work that much better (and enable the attacker to go “elephant hunting” for things like Yahoo!). It also allows the attacker to take a step or more back from the actual machines executing the attacks, making it more difficult to trace them.