Index
18 U.S.C. §1030 (Computer Fraud and Abuse Act), 244-246
18 U.S.C. §2510 (Wiretap Statute), 244
18 U.S.C. §1030(a)(3) (Trespassing on Government Computers), 244
18 U.S.C. §1030(a)(6) (Trafficking in Passwords), 244
ACC (aggregate congestion control), 222-223
Access, legal definition, 266-267
ACM SIGCOMM, 283
ACM TISSEC (Transactions on Information and System Security), 284-285
Active Network Defense (AND), See Active Response Continuum.
Active Response Continuum, 263-265
“Active Response to Computer Intrusions,” 263
Active queue management, 39
Agents
See also armies, botnets, bots, handlers.
controlling
attack phase, 75-79
direct commands, 69-71
indirect commands, 71-73
malware updates, 73-74
unwitting agents, 74-75
definition, 289
discovery, ...
Get Internet Denial of Service: Attack and Defense Mechanisms now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.