Flylib.com
Internet Denial of Service: Attack and Defense Mechanisms
Internet Denial of Service: Attack and Defense Mechanisms
ISBN: 0131475738
EAN: 2147483647
Year: 2003
Pages: 126
Authors:
Jelena Mirkovic
,
Sven Dietrich
,
David Dittrich
,
Peter Reiher
BUY ON AMAZON
Internet Denial of Service: Attack and Defense Mechanisms
Table of Contents
Copyright
The Radia Perlman Series in Computer Networking and Security Radia Perlman, Series Editor
Foreword
Acknowledgments
About the Authors
Chapter 1. Introduction
1.1. DoS and DDoS
1.2. Why Should We Care?
1.3. What Is This Book?
1.4. Who Is This Book For?
1.5. What Can This Book Help You Do?
1.6. Outline of the Remaining Chapters
Chapter 2. Understanding Denial of Service
2.1. The Ulterior Motive
2.2. Meet the Attackers
2.3. Behind the Scenes
2.4. Distribution Effects
2.5. DDoS: Hype or Reality?
2.6. How Vulnerable Are You to DDoS?
Chapter 3. History of DoS and DDoS
3.1. Motivation
3.2. Design Principles of the Internet
3.3. DoS and DDoS Evolution
Chapter 4. How Attacks Are Waged
4.1. Recruitment of the Agent Network
4.2. Controlling the DDoS Agent Network
4.3. Semantic Levels of DDoS Attacks
4.4. Attack Toolkits
4.5. What Is IP Spoofing?
4.6. DDoS Attack Trends
Chapter 5. An Overview of DDoS Defenses
5.1. Why DDoS Is a Hard Problem
5.2. DDoS Defense Challenges
5.3. Prevention versus Protection and Reaction
5.4. DDoS Defense Goals
5.5. DDoS Defense Locations
5.6. Defense Approaches
Chapter 6. Detailed Defense Approaches
6.1. Thinking about Defenses
6.2. General Strategy for DDoS Defense
6.3. Preparing to Handle a DDoS Attack
6.4. Handling an Ongoing DDoS Attack as a Target
6.5. Handling an Ongoing DDoS Attack as a Source
6.6. AgreementsUnderstandings with Your ISP
6.7. Analyzing DDoS tools
Chapter 7. Survey of Research Defense Approaches
7.1. Pushback
7.2. Traceback
7.3. D-WARD
7.4. NetBouncer
7.5. Secure Overlay Services (SOS)
7.6. Proof of Work
7.7. DefCOM
7.8. COSSACK
7.9. Pi
7.10. SIFF: An End-Host Capability Mechanism to Mitigate DDoS Flooding Attacks
7.11. Hop-Count Filtering (HCF)
7.12. Locality and Entropy Principles
7.13. An Empirical Analysis of Target-Resident DoS Filters
7.14. Research Prognosis
Chapter 8. Legal Issues
8.1. Basics of the U.S. Legal System
8.2. Laws That May Apply to DDoS Attacks
8.3. Who Are the Victims of DDoS?
8.4. How Often Is Legal Assistance Sought in DDoS Cases?
8.5. Initiating Legal Proceedings as a Victim of DDoS
8.6. Evidence Collection and Incident Response Procedures
8.7. Estimating Damages
8.8. Jurisdictional Issues
8.9. Domestic Legal Issues
8.10. International Legal Issues
8.11. Self-Help Options
8.12. A Few Words on Ethics
8.13. Current Trends in International Cyber Law
Chapter 9. Conclusions
9.1. Prognosis for DDoS
9.2. Social, Moral, and Legal Issues
9.3. Resources for Learning More
9.4. Conclusion
Appendix A. Glossary
Appendix B. Survey of Commercial Defense Approaches
B.1. Mazu Enforcer by Mazu Networks
B.2. Peakflow by Arbor Networks
B.3. WS Series Appliances by Webscreen Technologies
B.4. Captus IPS by Captus Networks
B.5. MANAnet Shield by CS3
B.6. Cisco Traffic Anomaly Detector XT and Cisco Guard XT
B.7. StealthWatch by Lancope
B.8. Summary
Appendix C. DDoS Data
C.1. 2004 CSIFBI Computer Crime and Security Survey
C.2. Inferring Internet Denial-of-Service Activity
C.3. A Framework for Classifying Denial-of-Service Attacks
C.4. Observations and Experiences Tracking Denial-of-Service Attacks across a Regional ISP
C.5. Report on the DDoS Attack on the DNS Root Servers
C.6. Conclusion
References
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_R
index_S
index_T
index_U
index_V
index_W
index_Y
index_Z
Internet Denial of Service: Attack and Defense Mechanisms
ISBN: 0131475738
EAN: 2147483647
Year: 2003
Pages: 126
Authors:
Jelena Mirkovic
,
Sven Dietrich
,
David Dittrich
,
Peter Reiher
BUY ON AMAZON
Qshell for iSeries
Running Qshell
The EDTF Text Editor
Scripting
Using Parameters and Variables
Input and Output
VBScript Programmers Reference
A Quick Introduction to Programming
What VBScript Is and Isn™t!
Variables and Procedures
Error Handling and Debugging
The Scripting Runtime Objects
Building Web Applications with UML (2nd Edition)
Distributed Objects
Discussion
The Artifacts
Glossary
Analysis Model Collaborations
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Basic Database Terminology
Client-Side APIs
PL/pgSQL
Point-in-time Recovery
Exchanging PostgreSQL Data with XML
File System Forensic Analysis
Digital Crime Scene Investigation Process
Introduction
Bibliography
NTFS Analysis
Other Topics
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Organizing and Estimating the Work
Making Quantitative Decisions
Expense Accounting and Earned Value
Quantitative Methods in Project Contracts
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies