Internet Denial of Service: Attack and Defense Mechanisms

 

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Y] [Z]

Fair scheduling algorithm False negatives 2nd [See also false positives.]

False positives. [See also false negatives.]

     defense goal     definition 2nd

fapi

Fault-tolerance

FBI

     CSI/FBI Computer Crime and Security Survey (2004)

     jurisdictional issues

     report on cost of attacks

     trigger point for involvement File system signature

Filtering. [See also egress filtering, ingress filtering, rate limiting.]

     attack response

     definition    incoming traffic. [See ingress filtering.]     ongoing attacks

    outgoing traffic. [See egress filtering.]

     packets    research on         Bloom filters

         HCF (Hop-Count Filtering)

         Pi filtering

         target-resident DoS filters

Financial crimes, evolution of find_ddos (NIPC scanning tool) 2nd

Firedaemon

Firewalls 2nd Flash crowds 2nd

Flooding attacks. [See also attacks; types of, vulnerability attacks.]

     characteristics of     defense approaches 2nd     definition     ICMP flood

     pure flooding

     random port TCP SYN flooding

     SYN flood attacks 2nd

     Targa flood

     UDP flood

     wonk flood

Flooding, definition

Flow logging

Fortifying a network. [See overprovisioning.]

FPort

Frequency of attacks 2nd

FTP servers

Fully random IP addresses, spoofing

 

Категории