Internet Denial of Service: Attack and Defense Mechanisms

 

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Y] [Z]

E-mail cluster bombsEffects of attacks. [See cost of attacks, damages.]

Egress filtering. [See also ingress filtering, IP spoofing.]

     definition     IP spoofing 2nd

Electronic communication privacy

Encryption, evolution of

End host vulnerability

End-to-end paradigm

Endurance approach

Entropy principle

Estimating     attack magnitude 2nd

     cost-estimation model

    costs and damages. [See cost of attacks, damages.]

    risk. [See risk assessment.]Ethical issues. [See moral issues, social issues.] "Ethics of Tracking Hacker Attacks . . . ,"

EURIM (European Information Society Group)

European Information Society Group (EURIM) Evidence collectionEvolution of DoS attacks

     1980s (late)

     1990s (early)

     1996

     1997     1998

     1999

     2000     2001

     2002

     2003     2004     extortion     financial crimes

     ICMP Echo Request packet attack

     reflection attack

     scripting attacks

     Smurf attacks 2nd

     spambots

     SYN floods

     tool development

    tools and programs

         Agobot

         boink program

         bonk program

         development timeline

         distributed scanners and sniffers         DSIT (Distributed System Intruder Tools) Workshop 2nd 3rd 4th 5th         encryption

         mstream 2nd 3rd 4th 5th 6th

         Phatbot         Shaft

         sniffers

         Stacheldraht

         teardrop program

         TFN (Tribe Flood Network) 2nd

         TFN2K (Tribe Flood Network 2000)

         trinoo 2nd 3rd

     vulnerability attacks     worms 2nd

Exploit programs

Exploiting a vulnerability

Exploits. [See also malware.]     combining 2nd     definition 2nd

     vulnerability attacks

External signature Extortion 2nd 3rd Extradition

 

Категории