Flylib.com
Internet Denial of Service: Attack and Defense Mechanisms
Internet Denial of Service: Attack and Defense Mechanisms
ISBN: 0131475738
EAN: 2147483647
Year: 2003
Pages: 126
Authors:
Jelena Mirkovic
,
Sven Dietrich
,
David Dittrich
,
Peter Reiher
BUY ON AMAZON
Internet Denial of Service: Attack and Defense Mechanisms
Table of Contents
Copyright
The Radia Perlman Series in Computer Networking and Security Radia Perlman, Series Editor
Foreword
Acknowledgments
About the Authors
Chapter 1. Introduction
1.1. DoS and DDoS
1.2. Why Should We Care?
1.3. What Is This Book?
1.4. Who Is This Book For?
1.5. What Can This Book Help You Do?
1.6. Outline of the Remaining Chapters
Chapter 2. Understanding Denial of Service
2.1. The Ulterior Motive
2.2. Meet the Attackers
2.3. Behind the Scenes
2.4. Distribution Effects
2.5. DDoS: Hype or Reality?
2.6. How Vulnerable Are You to DDoS?
Chapter 3. History of DoS and DDoS
3.1. Motivation
3.2. Design Principles of the Internet
3.3. DoS and DDoS Evolution
Chapter 4. How Attacks Are Waged
4.1. Recruitment of the Agent Network
4.2. Controlling the DDoS Agent Network
4.3. Semantic Levels of DDoS Attacks
4.4. Attack Toolkits
4.5. What Is IP Spoofing?
4.6. DDoS Attack Trends
Chapter 5. An Overview of DDoS Defenses
5.1. Why DDoS Is a Hard Problem
5.2. DDoS Defense Challenges
5.3. Prevention versus Protection and Reaction
5.4. DDoS Defense Goals
5.5. DDoS Defense Locations
5.6. Defense Approaches
Chapter 6. Detailed Defense Approaches
6.1. Thinking about Defenses
6.2. General Strategy for DDoS Defense
6.3. Preparing to Handle a DDoS Attack
6.4. Handling an Ongoing DDoS Attack as a Target
6.5. Handling an Ongoing DDoS Attack as a Source
6.6. AgreementsUnderstandings with Your ISP
6.7. Analyzing DDoS tools
Chapter 7. Survey of Research Defense Approaches
7.1. Pushback
7.2. Traceback
7.3. D-WARD
7.4. NetBouncer
7.5. Secure Overlay Services (SOS)
7.6. Proof of Work
7.7. DefCOM
7.8. COSSACK
7.9. Pi
7.10. SIFF: An End-Host Capability Mechanism to Mitigate DDoS Flooding Attacks
7.11. Hop-Count Filtering (HCF)
7.12. Locality and Entropy Principles
7.13. An Empirical Analysis of Target-Resident DoS Filters
7.14. Research Prognosis
Chapter 8. Legal Issues
8.1. Basics of the U.S. Legal System
8.2. Laws That May Apply to DDoS Attacks
8.3. Who Are the Victims of DDoS?
8.4. How Often Is Legal Assistance Sought in DDoS Cases?
8.5. Initiating Legal Proceedings as a Victim of DDoS
8.6. Evidence Collection and Incident Response Procedures
8.7. Estimating Damages
8.8. Jurisdictional Issues
8.9. Domestic Legal Issues
8.10. International Legal Issues
8.11. Self-Help Options
8.12. A Few Words on Ethics
8.13. Current Trends in International Cyber Law
Chapter 9. Conclusions
9.1. Prognosis for DDoS
9.2. Social, Moral, and Legal Issues
9.3. Resources for Learning More
9.4. Conclusion
Appendix A. Glossary
Appendix B. Survey of Commercial Defense Approaches
B.1. Mazu Enforcer by Mazu Networks
B.2. Peakflow by Arbor Networks
B.3. WS Series Appliances by Webscreen Technologies
B.4. Captus IPS by Captus Networks
B.5. MANAnet Shield by CS3
B.6. Cisco Traffic Anomaly Detector XT and Cisco Guard XT
B.7. StealthWatch by Lancope
B.8. Summary
Appendix C. DDoS Data
C.1. 2004 CSIFBI Computer Crime and Security Survey
C.2. Inferring Internet Denial-of-Service Activity
C.3. A Framework for Classifying Denial-of-Service Attacks
C.4. Observations and Experiences Tracking Denial-of-Service Attacks across a Regional ISP
C.5. Report on the DDoS Attack on the DNS Root Servers
C.6. Conclusion
References
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_R
index_S
index_T
index_U
index_V
index_W
index_Y
index_Z
Internet Denial of Service: Attack and Defense Mechanisms
ISBN: 0131475738
EAN: 2147483647
Year: 2003
Pages: 126
Authors:
Jelena Mirkovic
,
Sven Dietrich
,
David Dittrich
,
Peter Reiher
BUY ON AMAZON
The .NET Developers Guide to Directory Services Programming
Selecting the Right Technology
Binding and CRUD Operations with DirectoryEntry
Virtual List View Searches
Summary
Discovering the Cause of Authentication Failures
Image Processing with LabVIEW and IMAQ Vision
Video Standards
Image Processing
Pattern Matching
Reading Instrument Displays
Character Recognition
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Using Cell Names (Like Programming Variables)
Parsing Data
Using a Single Spreadsheet Function for Linear Curve Fitting
Calculating the Second Moment of an Area
Tackling Coupled Equations
Cisco CallManager Fundamentals (2nd Edition)
Call Hunting Constructs
Calling Search Spaces and Partitions
Creation and Usage of CDR Data
Appendix A. Feature List
Infrastructure Solutions
Twisted Network Programming Essentials
Accessing a Password-Protected Page
Checking Whether a Page Has Changed
Using the REST Architecture for Web Services
Sharing Web Services with SOAP
Listing the Newsgroups on a Server
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Using the System.Management Namespace
The WMI Schema
WMI Providers
WMI Security
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies