Internet Denial of Service: Attack and Defense Mechanisms

 

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Y] [Z]

"A Framework for Classifying Denial of Service Attacks," ACC (aggregate congestion control)

Access, legal definition

ACM SIGCOMM ACM TISSEC (Transactions on Information and System Security)

Active Network Defense (AND) [See Active Response Continuum.]

Active queue management

Active Response Continuum

"Active Response to Computer Intrusions,"

Agents [See also armies, botnets, bots, handlers.]

    controlling

         attack phase         direct commands

         indirect commands

         malware updates

         unwitting agents     definition     discovery, tools for

    recruiting

         backdoors         bots         finding vulnerable machines

         malware propagation

         propagation vectors

         scanning

         worms     unwitting

Aggregate congestion control (ACC)

Aggregating costs Aggregation point

Agobot 2nd 3rd

aguri AIDS analogy Algorithmic attacks All Party Internet Group (APIG)

Amplification 2nd 3rd

Analyzing attacks. [See malware, analysis.]

AND (Active Network Defense). [See Active Response Continuum.]

Annual Computer Security Applications Conference

Anomaly detection. [See also misbehavior detection, signature detection.]

     definition

     description

Anti-analysis

Anti-forensics

APIG (All Party Internet Group)

Application attacks

Armies [See also agents, botnets, bots, handlers, networks.]

Articles. [See publications.] Artifacts [See also malware.] Asynchronous communication

Attack detection. [See also detection.]

     accuracy     anomaly detection

     attack characteristics

     behavioral models

     core-based techniques

     false negatives

     false positives

     goals

     misbehavior modeling     signature detection

     source-based techniques

     standard-based models

     timeliness     victim-based techniques Attack phase

Attack response

     automated response     collateral damage     counterattacks

     filtering

     goals

     manual response

     rate limiting     service differentiation 2nd

     traceback 2nd

     traffic policing 2nd Attackers. [See also hackers.]

     hackers

     motivation 2nd 3rd     nation-state actors     profile     sophistication level

Attacking machines. [See also agents, handlers, stepping stones.]

     reflectors

Attacks. [See also DDoS, DoS.]

     algorithmic

    analyzing. [See malware, analysis.]

     attack trends

     characteristics

    controlling agents

         attack phase

         direct commands

         indirect commands

         unwitting agents

     criminal, prognosis     degradation of service     frequency 2nd

     hiding source of

    history of. [See Evolution of DoS attacks.]     HIV/AIDS analogy

     infrastructure

    IP spoofing

         benefits to attacker

         defenses

         description

         ingress/egress filtering

         levels of         limitations of

         raw socket access

        recruiting agents. [See agents, recruiting.]

         spoofing fully random IP addresses         spoofing victim addresses         subnet spoofing

     magnitude 2nd

    motivations         against chat channels         extortion 2nd 3rd

         from competitors

         political

     notable 2nd 3rd 4th 5th

    ongoing         as a source

         as a target

         backscatter traceback         BGP-speaking routers

         black hole routes

         filtering         hardcoded IP addresses         liability issues         sinkhole networks

     political

     prevention

    programs for. [See malware.]

    semantic levels

         algorithmic

         application attack

         attacking a protocol

         middleware attack

         Naptha attack

         pure flooding

         random port TCP SYN flooding

         resource attack

         SYN flood attacks         vulnerability attacks     sophistication

     traceback 2nd

     trends     types of. [See also flooding attacks, vulnerability attacks.]

         combining 2nd

         flooding

         IP spoofing, using.

         lagging

         misusing legitimate services

         Naptha attack

         reflection         Smurf attack

Auto-rooters 2nd

Automated infection toolkits

Automatic response Autonomous propagation

 

Категории