Caching and protecting against attacks
Types of attacks: Synchronize/ Acknowledge floods In a SYN flood attack, a malicious client sends a large number of SYN packets, but never sends the final ACK packets to complete the handshakes. The server is left waiting for a response to the half-open TCP connections and the idea is that the target eventually runs out of capacity to accept new TCP connections which prevents new users from connecting to the server, however the actual impact is more nuanced. UDP Floods https://docs.aws.amazon.com/whitepapers/latest/aws-best-practices-ddos-resiliency/udp-reflection-attacks.html Reflection attacks HTTP Flood attacks Distributed Denial of Service Attack Flooding your website with network traffic from multiple sources ( distributed groups of computers, IoT, etc) https://aws.amazon.com/blogs/security/how-to-protect-dynamic-web-applications-against-ddos-attacks-by-using-amazon-cloudfront-and-amazon-route-53/ Protection In AWS, DDoS mitigation capabilities are automatically provide...