Directory > Computers > Internet > Abuse > Denial of Service Network Ingress Filtering A simple, effective, and straightforward method for network administrators to prohibit DoS attacks which use forged IP addresses. http://www.faqs.org/rfcs/rfc2267.html Reviews Rating: Not yet Rated
Whois Check
Webscreen Technology Offers filtering appliances with DDoS mitigation features. http://www.webscreen-technology.com/ Reviews Rating: Not yet Rated
Whois Check
Riverhead Networks Offers managed products and services for DDoS mitigation and detection. http://www.riverhead.com/ Reviews Rating: Not yet Rated
Whois Check
Denial of Service (DoS) on the Internet Academic paper and slides on Denial of Service attacks. http://vayner.net/dos/ Reviews Rating: Not yet Rated
Whois Check
Magnification Attacks: smurf and fraggle Security whitepaper describing some common magnification attacks, what they are, and how to avoid them. http://pintday.org/whitepapers/dos-smurf.shtml Reviews Rating: Not yet Rated
Whois Check
Netscan.org Public service which proactively scans for networks acting as smurf amplifiers. http://netscan.org/ Reviews Rating: Not yet Rated
Whois Check
10 Proposed 'First-Aid' Security Measures Against Distributed Denial Of Service Attacks Whitepaper detailing "easy and fast to implement methods to protect against those attacks." [PDF format] http://www.securedynamic.com/whitepaper2.PDF Reviews Rating: Not yet Rated
Whois Check
DDOS Class Action Lawsuit Organization and discussion of class-action lawsuits by victims of DDOS attacks. http://www.ddos-ca.org/ Reviews Rating: Not yet Rated
Whois Check
National Infrastructure Protection Center (NIPC) The National Infrastructure Protection Center (NIPC) serves as a national critical infrastructure threat assessment, warning, vulnerability, and law enforcement investigation and response entity. http://www.nipc.gov/ Reviews Rating: Not yet Rated
Whois Check
Zombie Zapper Free, open source tool that can tell a zombie system to stop flooding. Zombie Zapper works against Trinoo, TFN, Stacheldraht, Troj_Trinoo (the trinoo daemon ported to Windows), and Shaft. http://razor.bindview.com/tools/ZombieZapper_form.shtml Reviews Rating: Not yet Rated
Whois Check
Internet Storm Center - Slammer Worm Analysis Detailed analysis of the Slammer worm responsible for recent widespread denial of service activities http://isc.incidents.org/analysis.html?id=180 Reviews Rating: Not yet Rated
Whois Check
GRC.com: Denial of Service Investigation and Exploration Pages Analysis and investigation of the DoS threat posed by Windows XP, and reports and logs from when GRC.com was the victim of a DDoS attack. http://grc.com/dos/intro.htm Reviews Rating: Not yet Rated
Whois Check
Red Hat Linux General Security Advisory Updated bind packages fixing DoS attack. http://rhn.redhat.com/errata/RHSA-2000-107.html Reviews Rating: Not yet Rated
Whois Check
CERT Incident Note: DoS Attacks Using Nameservers Description of how intruders are using nameservers to execute packet flooding denial of service attacks. http://www.cert.org/incident_notes/IN-2000-04.html Reviews Rating: Not yet Rated
Whois Check
Denial of Service Database Details of many attacks: categorized by platform affected and using OSAT notation. No longer updated. http://www.attrition.org/security/denial/ Reviews Rating: Not yet Rated
Whois Check
GCN.com: How to Stop a Service Denial Attack Before It Stops You Shawn P. McCarthy provides a quick overview of various kinds of DDOS attacks. He also explains why defending against this type of attack requires upstream infrastructure providers to cooperate with the victim. http://www.gcn.com/vol20_no17/news/4573-1.html Reviews Rating: Not yet Rated
Whois Check
ACM: Ubiquity - Distributed Denial-of-Service Attacks Article by M. E. Kabay about the effect of DDoS attacks on major e-commerce sites, and the legal ramifications thereof. http://www.acm.org/ubiquity/views/m_kabay_1.html Reviews Rating: Not yet Rated
Whois Check
DDoS World Knowledge base: including news articles, white papers, and advisories. http://www.ddosworld.com/ Reviews Rating: Not yet Rated
Whois Check
Whatis Definition of Denial of Service Definition plus discussion of various types of DoS attacks and how they work, including Buffer Overflow, SYN, Teardrop and Smurf. http://whatis.techtarget.com/definition/0,289893,sid9_gci213591,00.html Reviews Rating: Not yet Rated
Whois Check
DDoS Is Neither Dead Nor Forgotten How DDoS attacks have developed over the past year, and what has been learned; preparation is essential to prevention. [NetworkMagazine.com] http://www.networkmagazine.com/article/NMG20010125S0003 Reviews Rating: Not yet Rated
Whois Check
Distributed Denial of Service Attacks A DDOS exploit multiplies the disruptive power of denial of service attacks. The article discusses methods used and how to detect them. [NetworkMagazine.com] http://www.networkmagazine.com/article/NMG20000512S0041 Reviews Rating: Not yet Rated
Whois Check
Sans Institute Global Incident Analysis Center Special notice and analysis of Rootkit/Smurf Payload Toolkit v 1.1. http://www.sans.org/y2k/TFN_toolkit.htm Reviews Rating: Not yet Rated
Whois Check
Defying Denial of Service Attacks Discussion of the main DoS methods and how to protect your PCs and servers from them. [NetworkMagazine.com] http://www.networkmagazine.com/article/NMG20001130S0002 Reviews Rating: Not yet Rated
Whois Check
Stacheldraht Analysis An analysis of "stacheldraht", a distributed denial of service attack tool, based on source code from the "Tribe Flood Network" distributed denial of service attack tool. http://staff.washington.edu/dittrich/misc/stacheldraht.analysis Reviews Rating: Not yet Rated
Whois Check
Trinoo Analysis An analysis of the DoS Project's trin00 master/slave programs, which implement a distributed network denial of service tool. http://staff.washington.edu/dittrich/misc/trinoo.analysis Reviews Rating: Not yet Rated
Whois Check
CERT Advisory CA-2000-01 Denial of Service developments including description, impact, and solutions. http://www.cert.org/advisories/CA-2000-01.html Reviews Rating: Not yet Rated
Whois Check
Distributed Denial of Service (DDoS) Attacks and Tools A bibliography of recent papers and advisories on DDoS attacks and tools, by David Dittrich of the University of Washington (USA). http://staff.washington.edu/dittrich/misc/ddos/ Reviews Rating: Not yet Rated
Whois Check
Smurf Attack Information White paper describing and giving information on how to minimize the effects of smurf attacks. http://www.pentics.net/denial-of-service/white-papers/smurf.cgi Reviews Rating: Not yet Rated
Whois Check
Hacking the DoS An interview on hacking and denial of service attacks with Brian Martin and David Dittrich. Available in text and various forms of audio. http://www.pc-radio.com/otr/hacking.html Reviews Rating: Not yet Rated
Whois Check
Tools Stunt DoS Attack InternetWeek article written in the aftermath of the Denial of Service attack on Microsoft's domain name servers discusses various ways to combat these tactics. http://www.internetweek.com/newslead01/lead020501.htm Reviews Rating: Not yet Rated
Whois Check
Cisco Strategies to protect against distributed denial of service (DDoS) attacks. This article applies primarily to sites using Cisco equipment. http://www.cisco.com/warp/public/707/newsflash.html Reviews Rating: Not yet Rated
Whois Check
Microsoft Windows Update Latest bugfixes for Microsoft Windows, including fixes for some possible DoS attacks. http://windowsupdate.microsoft.com/ Reviews Rating: Not yet Rated
Whois Check
Denial of Service Help Page Advice for victims of Denial Of Service Attacks, geared towards users of IRC (Internet Relay Chat) http://www.irchelp.org/irchelp/nuke/ Reviews Rating: Not yet Rated
Whois Check
DoShelp.com Tools and patches to protect a person's computer from hackers, Denial of Service, and other intrusions. http://www.doshelp.com/ Reviews Rating: Not yet Rated
Whois Check
Denial of Service (DoS) Resource Page Collection of articles and links about Denial of Service attacks http://www.denialinfo.com/ Reviews Rating: Not yet Rated
Whois Check
Smurf Amplifier Registry The SAR lets you probe Internet connected IP networks to see whether or not they are configured in a way that will allow perpetrators to use them for smurf amplification. http://www.powertech.no/smurf/ Reviews Rating: Not yet Rated
Whois Check
SecurityFocus Site maintains an extensive database of vunerabilities and solutions including Denial Of Service attacks. http://www.securityfocus.org/ Reviews Rating: Not yet Rated
Whois Check
|