Red Hat Linux General Security Advisory
Updated bind packages for fixing DoS attack vulnerability in versions prior to 8.2.2_P7.
Sans Institute Global Incident Analysis Center
Special notice and analysis of Rootkit/Smurf Payload Toolkit v 1.1.
SecurityFocus
Site maintains an extensive database of vulnerabilities and solutions including Denial Of Service attacks.
Smurf Amplifier Registry
The Smurf Amplifier Registry (SAR) lets you probe Internet connected IP networks to see whether or not they are configured in a way that will allow perpetrators to use them for smurf amplification.
Smurf Attack Information
White paper describing and providing practical information on how to minimize the effects of smurf attacks.
Trinoo Analysis
An analysis of the DoS Project's trin00 master/slave programs, which implement a distributed network denial of service tool.
Understanding Denial-of-Service Attacks
A brief overview on identifying DoS attacks from the US-CERT (United States Computer Emergency Response Team).
Webscreen Technology
Offers filtering appliances with DDoS mitigation features.
Whatis Definition of Denial of Service
Definition plus discussion of various types of DoS attacks and how they work, including Buffer Overflow, SYN, Teardrop and Smurf.
Zombie Zapper
Free, open source tool that can tell a zombie system to stop flooding. Zombie Zapper works against Trinoo, TFN, Stacheldraht, Troj_Trinoo (the trinoo daemon ported to Windows), and Shaft.
GCN.com: How to Stop a Service Denial Attack Before It Stops You
Shawn P. McCarthy provides a quick overview of various kinds of Distributed Denial of Service (DDoS) attacks. He also explains why defending against this type of attack requires upstream infrastructure providers to cooperate with the victim. (July 2, 2001)
DDoS Is Neither Dead Nor Forgotten
February 1991 article on state of DDoS attacks, and what has been learned to that point. (February 5, 2001)
Tools Stunt DoS Attack
InternetWeek article written in the aftermath of the Denial of Service attack on Microsoft's domain name servers discusses various ways to combat these tactics. (February 5, 2001)
CERT Incident Note: DoS Attacks Using Nameservers
Description of how intruders use name servers to execute packet flooding denial of service attacks. (January 15, 2001)
Defying Denial of Service Attacks
Discussion of the main DoS methods and how to protect your PCs and servers from them. [NetworkMagazine.com] (December 5, 2000)
Distributed Denial of Service Attacks
A DDoS exploit multiplies the disruptive power of denial of service attacks. The article discusses methods used and how to detect them. [NetworkMagazine.com] (March 1, 2000)
ACM: Ubiquity - Distributed Denial-of-Service Attacks
Article by M. E. Kabay about the effect of DDoS attacks on major e-commerce sites, and the legal ramifications thereof. (February 20, 2000)
Stacheldraht Analysis
An analysis of "stacheldraht", a distributed denial of service attack tool, based on source code from the "Tribe Flood Network" distributed denial of service attack tool. (December 31, 1999)
CERT Advisory CA-2000-01 Denial-of-Service Developments
Denial of Service developments including description, impact, and solutions.
Cisco
Strategies to protect against distributed denial of service (DDoS) attacks. This article applies primarily to sites using Cisco equipment.
Results: Previous 1 2 3 4 5 6 7 Next