Internet Denial of Service: Attack and Defense Mechanisms

 

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Y] [Z]

MAC (mandatory access control) Machiavelli, on problem recognition and control

Magnitude of attacks 2nd

Mailing listsMalicious software. [See malware.]

Malware. [See also agents, bots, handlers.]

     analysis. [See also tools.]

         aguri

         anti-analysis

         anti-forensics

         classification

         closed port backdoor         command and control flow

         covert channels

         custom attack tools

         electronic communication privacy         external signature         file system signature

         FPort

         half-open scans         identifying the user         ifconfig

         internal signatures

         involving law enforcement

         legal issues

         libcap format         lsof

         malware artifacts

         Nessus         network state signature

         network taps

         network traffic signature         nmap         nondisclosure         port scanners

         process state signature

         ps

         Sleuthkit

         sniffers

         source code lineage

         surface analysis

         system log signature

         tcpdstat

         The Coroner's Toolkit

         top

         wiretap issues

     artifacts

     definition     propagation     updates

Mandatory access control (MAC)

Manual responseMasters. [See handlers.]

Measuring. [See estimating, malware; analysis.]

Memory utilization

Metcalf, Robert

Methodologies. [See defense approaches, defense strategies.]

Microsoft Security Readiness Kit

Microsoft TCP/IP stack bug

Middleton, United States versus. [See United States versus Middleton.] Middleware attack

Military responses

Misbehavior detection [See also anomaly detection, attack detection, detection, signature detection.]

Misbehavior modeling Misusing legitimate services MLATs (mutual legal assistance treaties)

Moderators (of IRC channels)

Modification of protocols strategy Monitoring traffic, commercial tools 2nd Moore, David 2nd

Moral issues 2nd [See also legal issues, social issues.]

Morris worm

Motivation of attackers 2nd 3rd

MSBlast. [See W32/Blaster.] Mscan

mstream

     analysis     direct commands

     effects

     features and use 2nd     in forensic analysis Mutual legal assistance treaties (MLATs)

 

Категории