Managing denial-of-service attacks

With Db2, you can manage denial-of-service attacks in the network connections to a Db2 server.

About this task

The most common type of denial-of-service attack occurs when an attacker "floods" a network with connection requests to a Db2 server. If this occurs, the attacker quickly exhausts the threshold for the maximum number of remote connections that are defined to the Db2 server system. As a result, no additional remote connections can be accepted by the Db2 server, including those from legitimate client systems.

To prevent the typical denial-of-service attacks, Db2 monitors the traffic of inbound connections and terminates those that don't contain data for establishing a valid connection.