Flylib.com
Internet Denial of Service: Attack and Defense Mechanisms
Internet Denial of Service: Attack and Defense Mechanisms
ISBN: 0131475738
EAN: 2147483647
Year: 2003
Pages: 126
Authors:
Jelena Mirkovic
,
Sven Dietrich
,
David Dittrich
,
Peter Reiher
BUY ON AMAZON
Internet Denial of Service: Attack and Defense Mechanisms
Table of Contents
Copyright
The Radia Perlman Series in Computer Networking and Security Radia Perlman, Series Editor
Foreword
Acknowledgments
About the Authors
Chapter 1. Introduction
1.1. DoS and DDoS
1.2. Why Should We Care?
1.3. What Is This Book?
1.4. Who Is This Book For?
1.5. What Can This Book Help You Do?
1.6. Outline of the Remaining Chapters
Chapter 2. Understanding Denial of Service
2.1. The Ulterior Motive
2.2. Meet the Attackers
2.3. Behind the Scenes
2.4. Distribution Effects
2.5. DDoS: Hype or Reality?
2.6. How Vulnerable Are You to DDoS?
Chapter 3. History of DoS and DDoS
3.1. Motivation
3.2. Design Principles of the Internet
3.3. DoS and DDoS Evolution
Chapter 4. How Attacks Are Waged
4.1. Recruitment of the Agent Network
4.2. Controlling the DDoS Agent Network
4.3. Semantic Levels of DDoS Attacks
4.4. Attack Toolkits
4.5. What Is IP Spoofing?
4.6. DDoS Attack Trends
Chapter 5. An Overview of DDoS Defenses
5.1. Why DDoS Is a Hard Problem
5.2. DDoS Defense Challenges
5.3. Prevention versus Protection and Reaction
5.4. DDoS Defense Goals
5.5. DDoS Defense Locations
5.6. Defense Approaches
Chapter 6. Detailed Defense Approaches
6.1. Thinking about Defenses
6.2. General Strategy for DDoS Defense
6.3. Preparing to Handle a DDoS Attack
6.4. Handling an Ongoing DDoS Attack as a Target
6.5. Handling an Ongoing DDoS Attack as a Source
6.6. AgreementsUnderstandings with Your ISP
6.7. Analyzing DDoS tools
Chapter 7. Survey of Research Defense Approaches
7.1. Pushback
7.2. Traceback
7.3. D-WARD
7.4. NetBouncer
7.5. Secure Overlay Services (SOS)
7.6. Proof of Work
7.7. DefCOM
7.8. COSSACK
7.9. Pi
7.10. SIFF: An End-Host Capability Mechanism to Mitigate DDoS Flooding Attacks
7.11. Hop-Count Filtering (HCF)
7.12. Locality and Entropy Principles
7.13. An Empirical Analysis of Target-Resident DoS Filters
7.14. Research Prognosis
Chapter 8. Legal Issues
8.1. Basics of the U.S. Legal System
8.2. Laws That May Apply to DDoS Attacks
8.3. Who Are the Victims of DDoS?
8.4. How Often Is Legal Assistance Sought in DDoS Cases?
8.5. Initiating Legal Proceedings as a Victim of DDoS
8.6. Evidence Collection and Incident Response Procedures
8.7. Estimating Damages
8.8. Jurisdictional Issues
8.9. Domestic Legal Issues
8.10. International Legal Issues
8.11. Self-Help Options
8.12. A Few Words on Ethics
8.13. Current Trends in International Cyber Law
Chapter 9. Conclusions
9.1. Prognosis for DDoS
9.2. Social, Moral, and Legal Issues
9.3. Resources for Learning More
9.4. Conclusion
Appendix A. Glossary
Appendix B. Survey of Commercial Defense Approaches
B.1. Mazu Enforcer by Mazu Networks
B.2. Peakflow by Arbor Networks
B.3. WS Series Appliances by Webscreen Technologies
B.4. Captus IPS by Captus Networks
B.5. MANAnet Shield by CS3
B.6. Cisco Traffic Anomaly Detector XT and Cisco Guard XT
B.7. StealthWatch by Lancope
B.8. Summary
Appendix C. DDoS Data
C.1. 2004 CSIFBI Computer Crime and Security Survey
C.2. Inferring Internet Denial-of-Service Activity
C.3. A Framework for Classifying Denial-of-Service Attacks
C.4. Observations and Experiences Tracking Denial-of-Service Attacks across a Regional ISP
C.5. Report on the DDoS Attack on the DNS Root Servers
C.6. Conclusion
References
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_R
index_S
index_T
index_U
index_V
index_W
index_Y
index_Z
Internet Denial of Service: Attack and Defense Mechanisms
ISBN: 0131475738
EAN: 2147483647
Year: 2003
Pages: 126
Authors:
Jelena Mirkovic
,
Sven Dietrich
,
David Dittrich
,
Peter Reiher
BUY ON AMAZON
Lotus Notes and Domino 6 Development (2nd Edition)
Inheriting Designs from Templates
Archiving Versions with Templates
Input Validation
Enabling Physical Security
ACL Privileges
The Complete Cisco VPN Configuration Guide
ISAKMP/IKE Phase 1
Concentrator Modules
Configuring the Windows VPN Client
PIX and ASA Site-to-Site Connections
Easy VPN Server Support for 7.0
101 Microsoft Visual Basic .NET Applications
Data Access
Building Windows Forms User Interfaces
Building Web Applications
Interacting with the Operating System
Advanced .NET Framework
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Market Orientation and Supply Chain Management in the Fashion Industry
Fashion Logistics and Quick Response
Rethinking Efficient Replenishment in the Grocery Sector
The Development of E-tail Logistics
Enterprise Resource Planning (ERP) Systems: Issues in Implementation
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Working with Ideas
Descriptive Statistics and Data Displays
Reducing Lead Time and Non-Value-Add Cost
Complexity Value Stream Mapping and Complexity Analysis
Selecting and Testing Solutions
DNS & BIND Cookbook
Getting a Precompiled Version of BIND
Disabling Caching
Viewing a Name Servers Cache
Signing Queries and Dynamic Updates with TSIG Programmatically
Discarding a Category of Messages
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies