Internet Denial of Service: Attack and Defense Mechanisms

 

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Y] [Z]

Back-chaining propagation Backdoors

Backscatter traceback

Barlow, Jason Behavioral models

Bellovin, Steve

Best-effort service model

BGP (Border Gateway Protocol), definition

BGP-speaking routers

Black Hat Briefings

Black hole routes

Blaster worm Blended threats. [See also malware.]

     definition

     recruiting agents

     tools 2nd Blocking traffic Bloom filters

BNC (bounce) [See also stepping stones.]

boink program bonk programBooks. [See publications.]

Border Gateway Protocol (BGP), definition

Botnets

Bots. [See also malware.]

     Agobot 2nd 3rd 4th     definition

     GTbot

     IRC bots 2nd 3rd     kaiten/knight bot 2nd 3rd 4th 5th

     Phatbot 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

     recruiting agents     Warez bots Bottlenecks, identifying Bounce (BNC) 2nd 3rd 4th [See also stepping stones.]

Boyd Cycle [See OODA Loop.]

Briefings, law enforcement

Brumley, David

Building secure systems

 

Категории