>> Application layer DDoS attacks , in most (all?) cases require a valid 
>> TCP/IP connection
> DNS query-floods are a notable exception.

may i remind you of the dns query flood i had which you helped research?
udp and tcp, from the same sources.

randy

Reply via email to