Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Y] [Z] Fair scheduling algorithm False negatives 2nd [See also false positives.] False positives. [See also false negatives.] defense goal definition 2nd fapi Fault-tolerance FBI CSI/FBI Computer Crime and Security Survey (2004) jurisdictional issues report on cost of attacks trigger point for involvement File system signature Filtering. [See also egress filtering, ingress filtering, rate limiting.] attack response definition incoming traffic. [See ingress filtering.] ongoing attacks outgoing traffic. [See egress filtering.] packets research on Bloom filters HCF (Hop-Count Filtering) Pi filtering target-resident DoS filters Financial crimes, evolution of find_ddos (NIPC scanning tool) 2nd Firedaemon Firewalls 2nd Flash crowds 2nd Flooding attacks. [See also attacks; types of, vulnerability attacks.] characteristics of defense approaches 2nd definition ICMP flood pure flooding random port TCP SYN flooding SYN flood attacks 2nd Targa flood UDP flood wonk flood Flooding, definition Flow logging Fortifying a network. [See overprovisioning.] FPort Frequency of attacks 2nd FTP servers Fully random IP addresses, spoofing |