Discussion Board

What techniques could a network administrator use to distinguish a malicious denial-of-service attack from one caused by component failure? Explain why a disgruntled user of a website is unlikely to be able to succeed at flooding the website.        

Sample Solution