Flylib.com
Internet Denial of Service: Attack and Defense Mechanisms
Internet Denial of Service: Attack and Defense Mechanisms
ISBN: 0131475738
EAN: 2147483647
Year: 2003
Pages: 126
Authors:
Jelena Mirkovic
,
Sven Dietrich
,
David Dittrich
,
Peter Reiher
BUY ON AMAZON
Internet Denial of Service: Attack and Defense Mechanisms
Table of Contents
Copyright
The Radia Perlman Series in Computer Networking and Security Radia Perlman, Series Editor
Foreword
Acknowledgments
About the Authors
Chapter 1. Introduction
1.1. DoS and DDoS
1.2. Why Should We Care?
1.3. What Is This Book?
1.4. Who Is This Book For?
1.5. What Can This Book Help You Do?
1.6. Outline of the Remaining Chapters
Chapter 2. Understanding Denial of Service
2.1. The Ulterior Motive
2.2. Meet the Attackers
2.3. Behind the Scenes
2.4. Distribution Effects
2.5. DDoS: Hype or Reality?
2.6. How Vulnerable Are You to DDoS?
Chapter 3. History of DoS and DDoS
3.1. Motivation
3.2. Design Principles of the Internet
3.3. DoS and DDoS Evolution
Chapter 4. How Attacks Are Waged
4.1. Recruitment of the Agent Network
4.2. Controlling the DDoS Agent Network
4.3. Semantic Levels of DDoS Attacks
4.4. Attack Toolkits
4.5. What Is IP Spoofing?
4.6. DDoS Attack Trends
Chapter 5. An Overview of DDoS Defenses
5.1. Why DDoS Is a Hard Problem
5.2. DDoS Defense Challenges
5.3. Prevention versus Protection and Reaction
5.4. DDoS Defense Goals
5.5. DDoS Defense Locations
5.6. Defense Approaches
Chapter 6. Detailed Defense Approaches
6.1. Thinking about Defenses
6.2. General Strategy for DDoS Defense
6.3. Preparing to Handle a DDoS Attack
6.4. Handling an Ongoing DDoS Attack as a Target
6.5. Handling an Ongoing DDoS Attack as a Source
6.6. AgreementsUnderstandings with Your ISP
6.7. Analyzing DDoS tools
Chapter 7. Survey of Research Defense Approaches
7.1. Pushback
7.2. Traceback
7.3. D-WARD
7.4. NetBouncer
7.5. Secure Overlay Services (SOS)
7.6. Proof of Work
7.7. DefCOM
7.8. COSSACK
7.9. Pi
7.10. SIFF: An End-Host Capability Mechanism to Mitigate DDoS Flooding Attacks
7.11. Hop-Count Filtering (HCF)
7.12. Locality and Entropy Principles
7.13. An Empirical Analysis of Target-Resident DoS Filters
7.14. Research Prognosis
Chapter 8. Legal Issues
8.1. Basics of the U.S. Legal System
8.2. Laws That May Apply to DDoS Attacks
8.3. Who Are the Victims of DDoS?
8.4. How Often Is Legal Assistance Sought in DDoS Cases?
8.5. Initiating Legal Proceedings as a Victim of DDoS
8.6. Evidence Collection and Incident Response Procedures
8.7. Estimating Damages
8.8. Jurisdictional Issues
8.9. Domestic Legal Issues
8.10. International Legal Issues
8.11. Self-Help Options
8.12. A Few Words on Ethics
8.13. Current Trends in International Cyber Law
Chapter 9. Conclusions
9.1. Prognosis for DDoS
9.2. Social, Moral, and Legal Issues
9.3. Resources for Learning More
9.4. Conclusion
Appendix A. Glossary
Appendix B. Survey of Commercial Defense Approaches
B.1. Mazu Enforcer by Mazu Networks
B.2. Peakflow by Arbor Networks
B.3. WS Series Appliances by Webscreen Technologies
B.4. Captus IPS by Captus Networks
B.5. MANAnet Shield by CS3
B.6. Cisco Traffic Anomaly Detector XT and Cisco Guard XT
B.7. StealthWatch by Lancope
B.8. Summary
Appendix C. DDoS Data
C.1. 2004 CSIFBI Computer Crime and Security Survey
C.2. Inferring Internet Denial-of-Service Activity
C.3. A Framework for Classifying Denial-of-Service Attacks
C.4. Observations and Experiences Tracking Denial-of-Service Attacks across a Regional ISP
C.5. Report on the DDoS Attack on the DNS Root Servers
C.6. Conclusion
References
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_R
index_S
index_T
index_U
index_V
index_W
index_Y
index_Z
Internet Denial of Service: Attack and Defense Mechanisms
ISBN: 0131475738
EAN: 2147483647
Year: 2003
Pages: 126
Authors:
Jelena Mirkovic
,
Sven Dietrich
,
David Dittrich
,
Peter Reiher
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
ORM Constraints
Reverse Engineering and Importing to ORM
Creating a Basic Logical Database Model
Generating a Physical Database Schema
Editing Logical Models”Intermediate Aspects
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Basic Graphics Commands
The Art of Using Animated Sprites for 2D Games
Adding Sound Effects to Your Game
Loading and Saving Information Using Files
Epilogue
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 1. Get Around http://maps.google.com
Hack 29. Find the Best Gasoline Prices
Hack 43. Dont Believe Everything You Read on a Map
Hack 52. Put a Map and HTML into Your Info Windows
Hack 56. Pin Your Own Maps to Google Maps with TPhoto
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 35. Check Wi-Fi Network Performance with Qcheck
Hack 41. Visualize a Network
Hack 50. Interrogate the Network
Hack 53. Do-It-Yourself Access Point Hardware
Hack 81. Use a Windows-Only Wireless Card in Linux
DNS & BIND Cookbook
Getting a Precompiled Version of BIND
Making Your Services Easy to Find
Returning Different Answers to Different Queriers
Introduction
Restricting the Queries a Name Server Answers
Understanding Digital Signal Processing (2nd Edition)
DFT SCALLOPING LOSS
DFT RESOLUTION, ZERO PADDING, AND FREQUENCY-DOMAIN SAMPLING
Chapter Eight. Quadrature Signals
INTERPOLATING A BANDPASS SIGNAL
Section D.1. STATISTICAL MEASURES
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies