Internet Denial of Service: Attack and Defense Mechanisms

 

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Y] [Z]

"I Love You" virus 2nd ICAMP (Incident Cost Analysis and Modeling Project)

ICMP Echo Reply packet attacks

ICMP Echo Request packet attack 2nd ICNP (International Conferences on Network Protocols)

Identifying legitimate traffic. [See service differentiation.]

Identity, online

IDS (intrusion detection systems) 2nd 3rd [See also defense.]

IEEE Cipher list

IEEE Cipher newsletter

IEEE Information Assurance Workshop

IEEE International Conferences on Network Protocols IEEE Security and Privacy

IEEE Symposium on Security and Privacy

IEEE Transactions on Dependable and Secure Computing

IEEE/ACM Transactions on Networking ifconfig Impairing access to data

Incident Cost Analysis and Modeling Project (ICAMP)

Incident response life cycle Incident response procedures Indirect commands

inetd

"Inferring Internet Denial-of-Service Activity," 2nd

Infocom

Infrastructure attacks Ingress filtering. [See also egress filtering, IP headers, IP spoofing.]

     definition

     IP spoofing 2nd Initial sequence number (ISN)

Insurance coverage

Internal signatures International Conferences on Network Protocols (ICNP)Internet    design principles

         active queue management

         best-effort service model

         circuit-switched networking

         congestion avoidance

         end-to-end paradigm

         fair scheduling algorithm

         packet-switched networking

         store-and-forward switching

     management

     popularity

     scale

     security issues

     user profiles Internet DNS root server attack 2ndInternet Relay Chat (IRC)

     costs of damage

     definitionInternet Service Providers (ISPs). [See ISPs (Internet Service Providers).]

Internet worms. [See worms.]

Internet, evolution

     CERT/CC established

     CERT/CC workshop

     distributed computing

     false DNS requests

     government, role of     Morris worm

     security issues

     spam

     Y2K failures Intrusion detection systems (IDS) 2nd 3rd [See also defense.] Involving law enforcement

iostat

IP addresses, hardcoded IP headers [See also ingress/egress filtering, IP spoofing.]     definition

     header fields

IP spoofing. [See also amplification, IP headers.]

     benefits to attacker

     defenses     definition 2nd

     description

     ingress/egress filtering 2nd     levels of

     limitations of

     raw socket access     spoofing fully random IP addresses     spoofing victim addresses     subnet spoofing

     traffic analysis

IRC (Internet Relay Chat)

    attacks

         motives for

     bots

     costs of damage

     definition

ISN (Initial Sequence Number). [See Initial Sequence Number.]

ISPs (Internet Service Providers). [See also NSPs.]

     contacts

     coordinating defenses

     definition

     flow logging     network address agility     null routing

     out-of-band management network

     topological changes     traffic blocking

     traffic capture/analysis

 

Категории