The request is passed on, and from the aspect of performance, the long chain of responsibilities is avoided to improve the performance.回头答不上来,当着这么多读书人。When an attacker sends an http post request, he sets the Content-Length to a large value in the request header and sends the http body to the web server at a very slow speed, byte by byte. The web server always needs to maintain the connection with the client and wait for the data transmission to end. Because the content-length is set to a large value and the http body transmission speed is very slow, attackers can occupy this connection for a long time.《火星异种》讲述了在21世纪中期,人类为了让火星变得更加适合居住,将用来改良环境的藻类以及适应性很强的蟑螂投放到了火星上。可是没想到这些生物却拥有了智慧,并且对人类展开了反击。二次上战场,板栗又体会到不同的惨烈。顿了一下,他提示道:娘不但喜欢她,她家跟咱们家也算是世交。Attackers can use ICMP/IGMP flood attacks and UDP flood attacks to directly launch distributed denial of service attacks that consume network broadband resources. However, this attack method is not only low, but also easy to find the source of the attack. Although attackers can hide by forging the source IP address, a better way is to use reflection attack technology.