index_C

 


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Y] [Z]

CAIDA (Cooperative Association for Internet Data Analysis) 2nd 3rd 4th 5th
CanSecWest
CERT/CC (CERT Coordination Center)
    advisories
         CA-1999 17 "Denial-of-service tools,"
         CA-2000 01 "Denial-of-service developments,"
     established
     first (DSIT) workshop 2nd 3rd 4th 5th
    incident notes
         IN-99 04 "Attacks using various RPC services,"
     reporting to
     Web site
Chain of custody
Challenges [See also puzzles.]
Characterization of attacks
Charges for packet sending
Chats. [See IRC (Internet Relay Chat).]
CIDR (classless internet domain routing), definition
Circuit-switched networking
Civil law 2nd [See also legal issues.]
Class actions suits [See also legal issues.]
Classless internet domain routing (CIDR), definition
Client legitimacy. [See service differentiation.]
Closed port backdoor
Closing unneeded ports
CMA (Computer Misuse Act) (United Kingdom)
CND-RA (Computer Network Defense-Response Actions). [See Active Response Continuum.]
Code Red worm 2nd 3rd 4th 5th 6th 7th
Collateral damage
     attack response
     definition
     filtering
     legitimate traffic
Combining attacks 2nd
Combining exploits 2nd
Command and control flow
Compartmentalizing your network
Competitor attacks
Completeness, defense strategy
Computer Communication Review
Computer data, as property
Computer Fraud and Abuse Act (18 U.S.C.§1030)
Computer Network Defense-Response Actions (CND-RA). [See Active Response Continuum.]
Conferences and workshops. [See also online resources, publications.]
     ACM SIGCOMM
     Annual Computer Security Applications Conference
     Black Hat Briefings
     CanSecWest
     ICNP (International Conferences onNetwork Protocols)
     IEEE Information Assurance Workshop
     IEEE International Conferences on Network Protocols
     IEEE Symposium on Security and Privacy
     Infocom
     NDSS (Networks and Distributed Security Symposium)
     NSPW (New Security Paradigms Workshop)
     Usenix Security Symposium
     Usenix Technical Conference
Congestion avoidance
Congestion control mechanisms
Congestion signatures
Connection depletion attacks, defense approaches
Controlling agents
     attack phase
     direct commands
     indirect commands
     unwitting agents
Convention on Cybercrime
Cooperative Association for Internet Data Analysis (CAIDA) 2nd 3rd 4th 5th
COordinated Suppression of Simultaneous AttaCKs (COSSACK)
Coordinating defenses
Core-based techniques
COSSACK (COordinated Suppression of Simultaneous AttaCKs)
Cost of attacks. [See also damages.]
     aggregating
     cost-estimation model
     defense
     "Developing an Effective Incident Cost Analysis Mechanism,"
     estimating 2nd
     examples
     FBI report (2004)
     gambling business
     hidden costs
     ICAMP (Incident Cost Analysis and Modeling Project)
     IRC (Internet Relay Chat)
     loss, legal definition 2nd
     overprovisioning
     trigger for federal statutes
     United States v. Middleton
     unused spare equipment
Cost-estimation model
Courts. [See legal issues.]
Covert channels
Crackers. [See attackers, hackers.]
Criminal attacks [See also legal issues.]
Criminal culpability [See also legal issues.]
Criminal law 2nd [See also legal issues.]
Critical versus non-critical services
cron
Cryptogram list
Cryptogram newsletter
CSI/FBI Computer Crime and Security Survey
Custom attack tools
Custom defense systems
Cyber law. [See legal issues.]
Cybercrime [See also legal issues.]
Cyberwarfare

 


Internet Denial of Service. Attack and Defense Mechanisms
Internet Denial of Service: Attack and Defense Mechanisms
ISBN: 0131475738
EAN: 2147483647
Year: 2003
Pages: 126

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net