Attacks

When crackers attempt to break into or disable systems, their behavior can be categorized as a certain type of attack. This section discusses different ways that a network (such as the Internet) can be used to attack systems, attacks that can come from inside your infrastructure, and how crackers can divert your legitimate Internet traffic.

Network Attacks

Denial of Service (DoS) attacks drain a Web host of a scarce resource. This could be a resource such as open TCP connections or the amount of memory allocated to receiving client requests. After this resource has been overly used, it isn't available to service real client requests.

Buffer overflows occur when a network address receives more data than the program supporting that address ...

Get BEA WebLogic Server™ 8.1 Unleashed now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.