index_A

 


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Y] [Z]

"A Framework for Classifying Denial of Service Attacks,"
ACC (aggregate congestion control)
Access, legal definition
ACM SIGCOMM
ACM TISSEC (Transactions on Information and System Security)
Active Network Defense (AND) [See Active Response Continuum.]
Active queue management
Active Response Continuum
"Active Response to Computer Intrusions,"
Agents [See also armies, botnets, bots, handlers.]
    controlling
         attack phase
         direct commands
         indirect commands
         malware updates
         unwitting agents
     definition
     discovery, tools for
    recruiting
         backdoors
         bots
         finding vulnerable machines
         malware propagation
         propagation vectors
         scanning
         worms
     unwitting
Aggregate congestion control (ACC)
Aggregating costs
Aggregation point
Agobot 2nd 3rd
aguri
AIDS analogy
Algorithmic attacks
All Party Internet Group (APIG)
Amplification 2nd 3rd
Analyzing attacks. [See malware, analysis.]
AND (Active Network Defense). [See Active Response Continuum.]
Annual Computer Security Applications Conference
Anomaly detection. [See also misbehavior detection, signature detection.]
     definition
     description
Anti-analysis
Anti-forensics
APIG (All Party Internet Group)
Application attacks
Armies [See also agents, botnets, bots, handlers, networks.]
Articles. [See publications.]
Artifacts [See also malware.]
Asynchronous communication
Attack detection. [See also detection.]
     accuracy
     anomaly detection
     attack characteristics
     behavioral models
     core-based techniques
     false negatives
     false positives
     goals
     misbehavior modeling
     signature detection
     source-based techniques
     standard-based models
     timeliness
     victim-based techniques
Attack phase
Attack response
     automated response
     collateral damage
     counterattacks
     filtering
     goals
     manual response
     rate limiting
     service differentiation 2nd
     traceback 2nd
     traffic policing 2nd
Attackers. [See also hackers.]
     hackers
     motivation 2nd 3rd
     nation-state actors
     profile
     sophistication level
Attacking machines. [See also agents, handlers, stepping stones.]
     reflectors
Attacks. [See also DDoS, DoS.]
     algorithmic
    analyzing. [See malware, analysis.]
     attack trends
     characteristics
    controlling agents
         attack phase
         direct commands
         indirect commands
         unwitting agents
     criminal, prognosis
     degradation of service
     frequency 2nd
     hiding source of
    history of. [See Evolution of DoS attacks.]
     HIV/AIDS analogy
     infrastructure
    IP spoofing
         benefits to attacker
         defenses
         description
         ingress/egress filtering
         levels of
         limitations of
         raw socket access
        recruiting agents. [See agents, recruiting.]
         spoofing fully random IP addresses
         spoofing victim addresses
         subnet spoofing
     magnitude 2nd
    motivations
         against chat channels
         extortion 2nd 3rd
         from competitors
         political
     notable 2nd 3rd 4th 5th
    ongoing
         as a source
         as a target
         backscatter traceback
         BGP-speaking routers
         black hole routes
         filtering
         hardcoded IP addresses
         liability issues
         sinkhole networks
     political
     prevention
    programs for. [See malware.]
    semantic levels
         algorithmic
         application attack
         attacking a protocol
         middleware attack
         Naptha attack
         pure flooding
         random port TCP SYN flooding
         resource attack
         SYN flood attacks
         vulnerability attacks
     sophistication
     traceback 2nd
     trends
     types of. [See also flooding attacks, vulnerability attacks.]
         combining 2nd
         flooding
         IP spoofing, using.
         lagging
         misusing legitimate services
         Naptha attack
         reflection
         Smurf attack
Auto-rooters 2nd
Automated infection toolkits
Automatic response
Autonomous propagation

 


Internet Denial of Service. Attack and Defense Mechanisms
Internet Denial of Service: Attack and Defense Mechanisms
ISBN: 0131475738
EAN: 2147483647
Year: 2003
Pages: 126

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net