Index

18 U.S.C. §1030 (Computer Fraud and Abuse Act), 244-246

18 U.S.C. §2510 (Wiretap Statute), 244

18 U.S.C. §1030(a)(3) (Trespassing on Government Computers), 244

18 U.S.C. §1030(a)(6) (Trafficking in Passwords), 244

ACC (aggregate congestion control), 222-223

Access, legal definition, 266-267

ACM SIGCOMM, 283

ACM TISSEC (Transactions on Information and System Security), 284-285

Active Network Defense (AND), See Active Response Continuum.

Active Response Continuum, 263-265

“Active Response to Computer Intrusions,” 263

Active queue management, 39

Agents

See also armies, botnets, bots, handlers.

controlling

attack phase, 75-79

direct commands, 69-71

indirect commands, 71-73

malware updates, 73-74

unwitting agents, 74-75

definition, 289

discovery, ...

Get Internet Denial of Service: Attack and Defense Mechanisms now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.