With Db2, you can
manage denial-of-service attacks in the network connections to a Db2 server.
About this task
The most common type of denial-of-service attack occurs when
an attacker "floods" a network with connection requests to a Db2 server. If this occurs, the
attacker quickly exhausts the threshold for the maximum number of
remote connections that are defined to the Db2 server system. As a result, no additional
remote connections can be accepted by the Db2 server, including those from legitimate client
systems. To prevent the typical denial-of-service attacks, Db2 monitors the traffic of inbound
connections and terminates those that don't contain data for establishing
a valid connection.