← Revision 1 as of 2002-03-01 18:41:49
Size: 563
Comment:
|
← Revision 2 as of 2002-03-01 18:42:22 →
Size: 621
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
"Denial of service" refers to attacks generated by aggressors that do not necessarily attempt to gain unauthorized access. They include "simple" denial of service, which usually exploits buggy code in the network implementation of the target, or wide disparity between the cracker's high bandwidth and the target's low, as well as [http://staff.washington.edu/dittrich/misc/ddos/ DDoS], which uses so called zombie programs which are inserted on various compromised hosts and directed to spam the target with all available resources. | "[http://www.cert.org/tech_tips/denial_of_service.html Denial of service]" refers to attacks generated by aggressors that do not necessarily attempt to gain unauthorized access. They include "simple" denial of service, which usually exploits buggy code in the network implementation of the target, or wide disparity between the cracker's high bandwidth and the target's low, as well as [http://staff.washington.edu/dittrich/misc/ddos/ DDoS], which uses so called zombie programs which are inserted on various compromised hosts and directed to spam the target with all available resources. |
Line 5: | Line 5: |
"[http://www.cert.org/tech_tips/denial_of_service.html Denial of service]" refers to attacks generated by aggressors that do not necessarily attempt to gain unauthorized access. They include "simple" denial of service, which usually exploits buggy code in the network implementation of the target, or wide disparity between the cracker's high bandwidth and the target's low, as well as [http://staff.washington.edu/dittrich/misc/ddos/ DDoS], which uses so called zombie programs which are inserted on various compromised hosts and directed to spam the target with all available resources.