As expected from reading about the previous DDoS attack, the target is subjected to a substantial amount of HTTP requests, for example, GET or POST requests, which, in turn, consume valuable resources on the host. Much like a SYN flood, this results in a lack of available resources to process and serve legitimate requests on the server, rendering the performance of the host unusable.




















































