
This is known as a maximum transmission unit, or MTU. Every network has its own limit for the size of datagrams it can process. Keep reading to find out how these attacks use internet protocol to wreak havoc and what you can do to prevent them from taking down your website.īefore you can fully understand how attackers are using fragmented datagrams to launch denial of service attacks, you’ll need a handle on datagram fragmentation – what it is and why it exists in the first place.ĭata is sent over the internet in the form of datagrams. Unfortunately for website owners, IP fragmentation attacks can be put into the malevolently ingenious category. Every single children’s show, which simultaneously manage to be addictive to children yet make parents want to put their heads through the drywall.


But sometimes malevolent ingenuity is so, well, ingenious that you can’t help but be impressed anyway. Human ingenuity isn’t always used for benevolent purposes, which is a shame. Featured blog by Debbie Fletcher, Independent Technology Writer
