Forum Discussion
Ppp2016_241036
Feb 19, 2016Nimbostratus
What type of DDOS controls that ASM can offer? Is it application DDOS attack? Does anyone has experience and understand how it works internally? How does ASM determine if the request is from human or botnet? Thanks!!