index_I

 


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Y] [Z]

"I Love You" virus 2nd
ICAMP (Incident Cost Analysis and Modeling Project)
ICMP Echo Reply packet attacks
ICMP Echo Request packet attack 2nd
ICNP (International Conferences on Network Protocols)
Identifying legitimate traffic. [See service differentiation.]
Identity, online
IDS (intrusion detection systems) 2nd 3rd [See also defense.]
IEEE Cipher list
IEEE Cipher newsletter
IEEE Information Assurance Workshop
IEEE International Conferences on Network Protocols
IEEE Security and Privacy
IEEE Symposium on Security and Privacy
IEEE Transactions on Dependable and Secure Computing
IEEE/ACM Transactions on Networking
ifconfig
Impairing access to data
Incident Cost Analysis and Modeling Project (ICAMP)
Incident response life cycle
Incident response procedures
Indirect commands
inetd
"Inferring Internet Denial-of-Service Activity," 2nd
Infocom
Infrastructure attacks
Ingress filtering. [See also egress filtering, IP headers, IP spoofing.]
     definition
     IP spoofing 2nd
Initial sequence number (ISN)
Insurance coverage
Internal signatures
International Conferences on Network Protocols (ICNP)
Internet
    design principles
         active queue management
         best-effort service model
         circuit-switched networking
         congestion avoidance
         end-to-end paradigm
         fair scheduling algorithm
         packet-switched networking
         store-and-forward switching
     management
     popularity
     scale
     security issues
     user profiles
Internet DNS root server attack 2nd
Internet Relay Chat (IRC)
     costs of damage
     definition
Internet Service Providers (ISPs). [See ISPs (Internet Service Providers).]
Internet worms. [See worms.]
Internet, evolution
     CERT/CC established
     CERT/CC workshop
     distributed computing
     false DNS requests
     government, role of
     Morris worm
     security issues
     spam
     Y2K failures
Intrusion detection systems (IDS) 2nd 3rd [See also defense.]
Involving law enforcement
iostat
IP addresses, hardcoded
IP headers [See also ingress/egress filtering, IP spoofing.]
     definition
     header fields
IP spoofing. [See also amplification, IP headers.]
     benefits to attacker
     defenses
     definition 2nd
     description
     ingress/egress filtering 2nd
     levels of
     limitations of
     raw socket access
     spoofing fully random IP addresses
     spoofing victim addresses
     subnet spoofing
     traffic analysis
IRC (Internet Relay Chat)
    attacks
         motives for
     bots
     costs of damage
     definition
ISN (Initial Sequence Number). [See Initial Sequence Number.]
ISPs (Internet Service Providers). [See also NSPs.]
     contacts
     coordinating defenses
     definition
     flow logging
     network address agility
     null routing
     out-of-band management network
     topological changes
     traffic blocking
     traffic capture/analysis

 


Internet Denial of Service. Attack and Defense Mechanisms
Internet Denial of Service: Attack and Defense Mechanisms
ISBN: 0131475738
EAN: 2147483647
Year: 2003
Pages: 126

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net