Internet Denial of Service: Attack and Defense Mechanisms

 

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Y] [Z]

"Observations and Experiences Tracking Denial-of-Service . . . ,"Observe, Orient, Decide, Act (OODA). [See OODA loop.]

One-way functions

Ongoing attacks. [See attacks, ongoing.] Online identity

Online resources. [See also conferences and workshops, publications.]

     @Risk: The Consensus Security Vulnerability Alert

     "Basic Steps in Forensic Analysis of UNIX Systems,"

     CAIDA (Cooperative Association for Internet Data Analysis)

     CERT/CC

     cost of attacks

     Cryptogram list     "Denial of Service Developments" (CA-2000 01)

     "Denial-of-Service Tools" (CA-1999 17)

     Department of Justice Cybercrime Web site

     "Developing an Effective Incident Cost Analysis Mechanism,"     "Distributed Denial of Service Tools" (IN-99 04)     "Distributed Denial of Service Tools" (Sun Bulletin #00193)

     Dittrich on the Active Response Continuum

     Dittrich rootkit FAQ     Dittrich, David, DDoS Web page     Dshield

     Honeynet Project 2nd 3rd

     IEEE Cipher list

     Jahanian report

     legal issues     mailing lists

     Microsoft Security Readiness Kit

     mstream analysis     network taps

     nmap

     Packetstorm Security     Phatbot analysis 2nd     Power bot analysis 2nd     Red Hat Linux (Patching) 2nd

     RID

     RISKS Digest newsgroup

     SANS list

     SANS NewsBytes (reports of Solaris intrusions)

     Sleuthkit

     sniffers 2nd 3rd 4th 5th 6th 7th 8th

     Stacheldraht analysis

     TFN analysis

     TFN2K analysis

     The Coroner's Toolkit

     trinoo analysis 2nd

     Windows updates

OODA (Observe, Orient, Decide, Act) Loop Operators, IRC Out-of-band management network

Overprovisioning 2nd [See also defense; hardening networks.]

Owners (of IRC channels)

 

Категории