Denial of Service Attacks
E. Eugene Schultz, University of California-Berkeley Lab
Motivations for Launching DoS Attacks
What Types of Sites Are Most Vulnerable?
Hardware and Software Sabotage
Shut-Down or Slow-Down Attacks
System Resource Starvation Attacks
Distributed Denial of Service (DDoS) Attacks
Risk Management Considerations
Uninterruptable Power Supplies (UPSs)
Quality of Service (QoS) Mechanisms
WHAT ARE DoS ATTACKS?
Background
News about some kind of disruption or prolonged outage of computing services due to malicious activity or programs seems to surface almost every day. In late 2001, for example, a flood of network traffic brought the New York Times network to a standstill. Earlier that year, the Web server of the Computer Emergency Response Team Coordination Center (CERT/CC) was brought down by a denial of service (DoS) attack. A series of DoS attacks in February 2000 brought down numerous systems used by ZDnet, eTrade, Amazon.com, eBay, ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.