What is a "Legitimate Users"? The Most Authoritative Explanation.

cart Shopcart:$0.00


What is a "Legitimate Users"? The Most Authoritative Explanation.

What is the difference between a legitimate user and an attacker?

In the other words, legitimate users are end point entities, which make connection requests for services provided by servers. Attackers are end points whose requests are focused on depleting the target bandwidth or resources.

What is a legitimate user?

Legitimate users are the users who have the legal requests to the accepted destination from the edge routers’ point of view (A1, …, Ak) and destination firewall routers ( B ), which are shown in the Figure 3.1. In the other words, legitimate users are end point entities, which make connection requests for services provided by servers.

What is the difference between a legitimate and a malicious user?

Flagging a legitimate user as malicious (false positive) results in the denial of service for legitimate users; conversely, identifying a malicious user as legitimate (false negative) may open the door for additional, undetected cyber-attacks. How then, do DDoS mitigation solutions distinguish between legitimate and malicious users?

How do attackers prevent access to legitimate users?

In other words, attackers try to prevent access of legitimate users to the particular server by keeping the number of simultaneous connection as large as possible. Sending session connection requests can be done with stationary rate or totally random.

Related Articles

You must know some knowledge about cell phone jammer.
What is a Wifi Jammer? How to Detect Wifi Jammer?