Perspectives on Distributed Denial of Service Attacks

2/29/00


Click here to start


Table of Contents

Perspectives on Distributed Denial of Service Attacks

The packet monkeys attack

The pundits respond

Why did this happen? Internet Protocols are weak--

Internet Implementation is a monoculture

Hosts are weak

Denial of service principles

Distributed denial of service principles

The Cracker Pyramid

SYN/UDP Flood DoS

Typical Smurf Attack

Distributed Denial Of Service

Trinoo Fact Sheet

Trinoo Analysis

Trinoo Detection

Tribal Flood Network (TFN)

TFN Detection

The Attack Against

The Attack Against

The Attack Against

The Attack Against

The Attack Against

The Attack Against

The Attack Against

The Attack Against

The Attack Against

Border Defenses

OS Hardening

OS Hardening - Windows

Know when you’re being attacked, and be able to respond

Security Tools

Non-Technical Remedies

Is this going to burst the Internet bubble?

Who is the typical cracker?

Author: jdlgarza

Email: allison@shasta.stanford.edu

Home Page: http://www.stanford.edu/class/ee380

Other information:
Slides for the Stanford Computer Systems Laboratory Colloquium for 23 Feb 2000.