CHAPTER 18
DENIAL-OF-SERVICE ATTACKS
Gary C. Kessler and Diane E. Levine
18.2 DENIAL-OF-SERVICE ATTACKS
18.2.1 History of Denial-of-Service Attacks
18.2.2 Costs of Denial-of-Service Attacks
18.2.3 Types of Denial-of-Service Attacks
18.2.4 Specific Denial-of-Service Attacks
18.2.5 Preventing and Responding to Denial-of-Service Attacks
18.3 DISTRIBUTED DENIAL-OF-SERVICE ATTACKS
18.3.1 Short History of Distributed Denial of Service
18.3.2 Distributed Denial-of-Service Terminology and Overview
18.3.3 Distributed Denial-of-Service Tool Descriptions
18.3.4 Defenses against Distributed Denials of Service
18.1 INTRODUCTION.
This chapter discusses denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks. These attacks seek to render target systems and networks unusable or inaccessible by saturating resources or causing catastrophic errors that halt processes or entire systems. Furthermore, they are increasingly easy for even script kiddies (persons who follow explicit attack instructions or execute attack programs) to launch. Successful defense against these attacks will come only when there is widespread cooperation among all Internet service providers (ISPs) and other Internet-connected systems worldwide.
Working in a variety of ways, the DoS attacker selects an intended target system and launches a concentrated attack against it. Although initially deemed to be primarily a “nuisance,” DoS attacks ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.