Index
[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[R]
[S]
[T]
[U]
[V]
[W]
[Y]
[Z]
"A Framework for Classifying Denial of Service Attacks," ACC (aggregate congestion control) Access, legal definition ACM SIGCOMM ACM TISSEC (Transactions on Information and System Security) Active Network Defense (AND)
[See Active Response Continuum.] Active queue management Active Response Continuum "Active Response to Computer Intrusions," Agents [See also armies, botnets, bots, handlers.] controlling attack phase direct commands indirect commands malware updates unwitting agents definition discovery, tools for recruiting backdoors bots finding vulnerable machines malware propagation propagation vectors scanning worms unwitting Aggregate congestion control (ACC) Aggregating costs Aggregation point Agobot 2nd 3rd aguri AIDS analogy Algorithmic attacks All Party Internet Group (APIG) Amplification 2nd 3rd Analyzing attacks.
[See malware, analysis.] AND (Active Network Defense).
[See Active Response Continuum.] Annual Computer Security Applications Conference Anomaly detection. [See also misbehavior detection, signature detection.] definition description Anti-analysis Anti-forensics APIG (All Party Internet Group) Application attacks Armies [See also agents, botnets, bots, handlers, networks.] Articles.
[See publications.] Artifacts [See also malware.] Asynchronous communication Attack detection. [See also detection.] accuracy anomaly detection attack characteristics behavioral models core-based techniques false negatives false positives goals misbehavior modeling signature detection source-based techniques standard-based models timeliness victim-based techniques Attack phase Attack response automated response collateral damage counterattacks filtering goals manual response rate limiting service differentiation 2nd traceback 2nd traffic policing 2nd Attackers. [See also hackers.] hackers motivation 2nd 3rd nation-state actors profile sophistication level Attacking machines. [See also agents, handlers, stepping stones.] reflectors Attacks. [See also DDoS, DoS.] algorithmic analyzing.
[See malware, analysis.] attack trends characteristics controlling agents attack phase direct commands indirect commands unwitting agents criminal, prognosis degradation of service frequency 2nd hiding source of history of.
[See Evolution of DoS attacks.] HIV/AIDS analogy infrastructure IP spoofing benefits to attacker defenses description ingress/egress filtering levels of limitations of raw socket access recruiting agents.
[See agents, recruiting.] spoofing fully random IP addresses spoofing victim addresses subnet spoofing magnitude 2nd motivations against chat channels extortion 2nd 3rd from competitors political notable 2nd 3rd 4th 5th ongoing as a source as a target backscatter traceback BGP-speaking routers black hole routes filtering hardcoded IP addresses liability issues sinkhole networks political prevention programs for.
[See malware.] semantic levels algorithmic application attack attacking a protocol middleware attack Naptha attack pure flooding random port TCP SYN flooding resource attack SYN flood attacks vulnerability attacks sophistication traceback 2nd trends types of. [See also flooding attacks, vulnerability attacks.] combining 2nd flooding IP spoofing, using. lagging misusing legitimate services Naptha attack reflection Smurf attack Auto-rooters 2nd Automated infection toolkits Automatic response Autonomous propagation
|