index_P

 


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Y] [Z]

Packet-marking techniques
Packet-switched networking
Packets. [See also IP headers, protocols.]
     charges for sending
     definition
     filtering
     throttling
Packetstorm Security
Paging activity
Papers. [See publications.]
Passwords
     guessing
     trafficking in
     weak
PCCIP (President's Commission on Critical Infrastructure Protection)
Phatbot
     analysis 2nd
     blended threat
     features and use 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
     password guessing
     peer-to-peer networks
     portability
     size of networks
     spam delivery
Phone numbers for reporting DDoS attacks
Pi filtering
Political attacks
Port scanners
Ports [See also protocols, TCP/IP.]
Post-mortem analysis
Postal analogy
Power bot
     analysis 2nd
     detection of command and control
     features and use 2nd 3rd 4th
     in forensic analysis 2nd
     unwitting agent
     use of IRC 2nd
PPM (probabilistic packet marking)
Preparation. [See also defense.]
     attack response
     automatic response
     closing unneeded ports
     compartmentalizing your network
     costs
     critical versus non-critical services
     custom defense systems
     disabling unneeded services
     discovering active services
     disk I/O performance
     end host vulnerability
     estimating damage costs
     fault-tolerance
     filtering incoming traffic
     hiding
     identifying bottlenecks
     incident response life cycle
     ingress/egress filtering
     insurance coverage
     ISP agreements 2nd
     MAC (mandatory access control)
     manual response
     memory utilization
     network I/O performance
     network risk assessment
     number of server processes
     overprovisioning
     processor utilization
     risk assessment
     scalability
     securing end hosts
     segregated services
     swapping/paging activity
     system tuning
President's Commission on Critical Infrastructure Protection PCCIP)
Prevention [See also defense.]
"Privacy Law" (Italy)
"Private Intrusion Response,"
Probabilistic packet marking (PPM)
Process state signature
Processor utilization
Programs. [See malware, tools.]
Proof of work 2nd
Propagation vectors
Prosecution. [See legal issues.]
Protection. [See also defense; prevention.]
     attack prevention
     endurance approach
     host vulnerabilities
     hygiene
     network organization
     packet filtering
Protocol attacks
Protocols [See also ports, TCP/IP.]
Provisioning. [See overprovisioning.]
ps 2nd
Publications. [See also conferences and workshops, online resources.]
     "A Framework for Classifying Denial of Service Attacks,"
     ACM TISSEC (Transactions on Information and System Security)
     "Active Response to Computer Intrusions,"
     Computer Communication Review
     "Convention on Cybercrime,"
     cost estimation
     Cryptogram newsletter
     CSI/FBI Computer Crime and Security Survey (2004) 2nd
     Denial-of-Service Developments, (CA-2000 01)
     Denial-of-Service Tools, (CA-1999 17)
     "Developing an Effective Incident Cost Analysis Mechanism,"
     "Distributed Denial of Service Tools" (IN-99 04)
     "Distributed Denial of Service Tools" (Sun Bulletin #00193)
     "Ethics of Tracking Hacker Attacks . . . ,"
     "Handbook on Information Security,"
     ICAMP (Incident Cost Analysis and Modeling Project)
     IEEE Cipher newsletter
     IEEE Security and Privacy
     IEEE Transactions on Dependable and Secure Computing
     IEEE/ACM Transactions on Networking
     "Inferring Internet Denial of Service Activity," 2nd
     Journal of Computer Security
     NIPC scanning tool 2nd
     "Observations and Experiences Tracking Denial-of-Service . . . ,"
     "Private Intrusion Response,"
     "Report on the DDoS Attack on the DNS Root Servers,"
     Shaft analysis 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
     Stacheldraht analysis 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
     "Targeting the Innocent . . . ,"
     TFN analysis 2nd
     TFN2K analysis
     "The Bad Boys of Cyberspace,"
     "The Experience of Bad Behavior . . . ,"
     tools development timeline 2nd
     trinoo analysis 2nd
     USENIX ;login;,
Pure flooding
Pushback
Puzzles [See also challenges.]

 


Internet Denial of Service. Attack and Defense Mechanisms
Internet Denial of Service: Attack and Defense Mechanisms
ISBN: 0131475738
EAN: 2147483647
Year: 2003
Pages: 126

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net