Filmed in Neustar's Security Operations Center, this video shows the first three minutes of an actual DDoS attack on a company's Transmission Control Protocol Synchronize (TCP SYN) authentication. This type of attack can overwhelm a server's available TCP connections with phony requests. On the far lower right corner of the screen, a log counter tallies the number of log events shown in this example. Note that the first 30,000 log events happening during the first three minutes of this specific DDoS attack. As a size reference, the full attack would have millions of events.