Internet Denial of Service: Attack and Defense Mechanisms

 

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Y] [Z]

Packet-marking techniques Packet-switched networking

Packets. [See also IP headers, protocols.]

     charges for sending     definition

     filtering

     throttling

Packetstorm Security

Paging activity

Papers. [See publications.]

Passwords

     guessing     trafficking in

     weak

PCCIP (President's Commission on Critical Infrastructure Protection)

Phatbot     analysis 2nd     blended threat

     features and use 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

     password guessing     peer-to-peer networks     portability

     size of networks

     spam delivery

Phone numbers for reporting DDoS attacks

Pi filtering Political attacks

Port scanners

Ports [See also protocols, TCP/IP.] Post-mortem analysis

Postal analogy

Power bot     analysis 2nd     detection of command and control     features and use 2nd 3rd 4th

     in forensic analysis 2nd

     unwitting agent

     use of IRC 2nd

PPM (probabilistic packet marking)

Preparation. [See also defense.]

     attack response

     automatic response

     closing unneeded ports

     compartmentalizing your network

     costs

     critical versus non-critical services

     custom defense systems

     disabling unneeded services     discovering active services     disk I/O performance

     end host vulnerability

     estimating damage costs     fault-tolerance

     filtering incoming traffic

     hiding

     identifying bottlenecks

     incident response life cycle

     ingress/egress filtering

     insurance coverage

     ISP agreements 2nd     MAC (mandatory access control)

     manual response

     memory utilization

     network I/O performance     network risk assessment     number of server processes

     overprovisioning

     processor utilization     risk assessment     scalability

     securing end hosts

     segregated services

     swapping/paging activity

     system tuning President's Commission on Critical Infrastructure Protection PCCIP)

Prevention [See also defense.]

"Privacy Law" (Italy) "Private Intrusion Response,"

Probabilistic packet marking (PPM)

Process state signature Processor utilizationPrograms. [See malware, tools.] Proof of work 2nd

Propagation vectors

Prosecution. [See legal issues.]

Protection. [See also defense; prevention.]

     attack prevention

     endurance approach

     host vulnerabilities

     hygiene

     network organization

     packet filtering

Protocol attacks

Protocols [See also ports, TCP/IP.]

Provisioning. [See overprovisioning.]

ps 2nd Publications. [See also conferences and workshops, online resources.]     "A Framework for Classifying Denial of Service Attacks,"

     ACM TISSEC (Transactions on Information and System Security)

     "Active Response to Computer Intrusions,"     Computer Communication Review

     "Convention on Cybercrime,"

     cost estimation

     Cryptogram newsletter

     CSI/FBI Computer Crime and Security Survey (2004) 2nd

     Denial-of-Service Developments, (CA-2000 01)

     Denial-of-Service Tools, (CA-1999 17)

     "Developing an Effective Incident Cost Analysis Mechanism,"     "Distributed Denial of Service Tools" (IN-99 04)

     "Distributed Denial of Service Tools" (Sun Bulletin #00193)

     "Ethics of Tracking Hacker Attacks . . . ,"

     "Handbook on Information Security,"     ICAMP (Incident Cost Analysis and Modeling Project)     IEEE Cipher newsletter

     IEEE Security and Privacy

     IEEE Transactions on Dependable and Secure Computing     IEEE/ACM Transactions on Networking     "Inferring Internet Denial of Service Activity," 2nd

     Journal of Computer Security

     NIPC scanning tool 2nd

     "Observations and Experiences Tracking Denial-of-Service . . . ,"

     "Private Intrusion Response,"     "Report on the DDoS Attack on the DNS Root Servers,"

     Shaft analysis 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

     Stacheldraht analysis 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th     "Targeting the Innocent . . . ,"

     TFN analysis 2nd

     TFN2K analysis     "The Bad Boys of Cyberspace,"     "The Experience of Bad Behavior . . . ,"     tools development timeline 2nd

     trinoo analysis 2nd

     USENIX ;login;,

Pure flooding

Pushback

Puzzles [See also challenges.]

 

Категории