Foreword |
|
xi | |
Acknowledgments |
|
xv | |
About the Authors |
|
xix | |
|
|
1 | (10) |
|
|
2 | (3) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
What Can This Book Help You Do? |
|
|
8 | (1) |
|
Outline of the Remaining Chapters |
|
|
8 | (3) |
|
Understanding Denial of Service |
|
|
11 | (18) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (5) |
|
Recruiting and Controlling Attacking Machines |
|
|
17 | (1) |
|
|
18 | (1) |
|
Misusing Legitimate Services |
|
|
19 | (1) |
|
|
20 | (2) |
|
|
22 | (5) |
|
How Common Are DDoS Attacks? |
|
|
22 | (2) |
|
The Magnitude of DDoS Attacks |
|
|
24 | (3) |
|
How Vulnerable Are You to DDoS? |
|
|
27 | (2) |
|
|
29 | (32) |
|
|
29 | (4) |
|
Design Principles of the Internet |
|
|
33 | (8) |
|
|
33 | (3) |
|
Best-Effort Service Model and End-to-End Paradigm |
|
|
36 | (3) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
41 | (20) |
|
History of Network-Based Denial of Service |
|
|
42 | (19) |
|
|
61 | (40) |
|
Recruitment of the Agent Network |
|
|
61 | (8) |
|
Finding Vulnerable Machines |
|
|
62 | (4) |
|
Breaking into Vulnerable Machines |
|
|
66 | (1) |
|
Malware Propagation Methods |
|
|
67 | (2) |
|
Controlling the DDoS Agent Network |
|
|
69 | (10) |
|
|
69 | (2) |
|
|
71 | (2) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
75 | (4) |
|
Semantic Levels of DDoS Attacks |
|
|
79 | (7) |
|
Exploiting a Vulnerability |
|
|
79 | (1) |
|
|
80 | (3) |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
86 | (6) |
|
Some Popular DDoS Programs |
|
|
87 | (2) |
|
|
89 | (2) |
|
|
91 | (1) |
|
|
92 | (6) |
|
Why Is IP Spoofing Defense Challenging? |
|
|
96 | (1) |
|
Why DDoS Attacks Use IP Spoofing |
|
|
97 | (1) |
|
Spoofing Is Irrelevant at 10,000+ Hosts |
|
|
97 | (1) |
|
|
98 | (3) |
|
An Overview of DDoS Defenses |
|
|
101 | (52) |
|
Why DDoS Is a Hard Problem |
|
|
102 | (3) |
|
|
105 | (3) |
|
|
106 | (1) |
|
|
107 | (1) |
|
Prevention versus Protection and Reaction |
|
|
108 | (5) |
|
|
109 | (3) |
|
|
112 | (1) |
|
|
113 | (4) |
|
|
117 | (11) |
|
|
117 | (3) |
|
|
120 | (3) |
|
|
123 | (3) |
|
Multiple Deployment Locations |
|
|
126 | (2) |
|
|
128 | (25) |
|
|
129 | (10) |
|
|
139 | (7) |
|
|
146 | (7) |
|
Detailed Defense Approaches |
|
|
153 | (68) |
|
|
153 | (3) |
|
General Strategy for DDoS Defense |
|
|
156 | (2) |
|
Preparing to Handle a DDoS Attack |
|
|
158 | (15) |
|
Understanding Your Network |
|
|
158 | (3) |
|
Securing End Hosts on Your Network |
|
|
161 | (5) |
|
|
166 | (3) |
|
Preparing to Respond to the Attack |
|
|
169 | (4) |
|
Handling an Ongoing DDoS Attack as a Target |
|
|
173 | (5) |
|
Handling an Ongoing DDoS Attack as a Source |
|
|
178 | (3) |
|
Agreements/Understandings with Your ISP |
|
|
181 | (2) |
|
|
183 | (38) |
|
|
185 | (1) |
|
Full Disclosure versus Nondisclosure |
|
|
186 | (4) |
|
How to Analyze Malware Artifacts |
|
|
190 | (31) |
|
Survey of Research Defense Approaches |
|
|
221 | (20) |
|
|
222 | (1) |
|
|
223 | (2) |
|
|
225 | (1) |
|
|
226 | (2) |
|
Secure Overlay Services (SOS) |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
SIFF: An End-Host Capability Mechanism to Mitigate DDoS Flooding Attacks |
|
|
233 | (1) |
|
Hop-Count Filtering (HCF) |
|
|
234 | (1) |
|
Locality and Entropy Principles |
|
|
235 | (1) |
|
|
235 | (1) |
|
|
235 | (1) |
|
An Empirical Analysis of Target-Resident DoS Filters |
|
|
236 | (2) |
|
|
238 | (3) |
|
|
238 | (1) |
|
Several Promising Approaches |
|
|
239 | (1) |
|
Difficult Deployment Challenges |
|
|
239 | (2) |
|
|
241 | (28) |
|
Basics of the U.S. Legal System |
|
|
241 | (3) |
|
Laws That May Apply to DDoS Attacks |
|
|
244 | (2) |
|
Who Are the Victims of DDoS? |
|
|
246 | (2) |
|
How Often Is Legal Assistance Sought in DDoS Cases? |
|
|
248 | (3) |
|
Initiating Legal Proceedings as a Victim of DDoS |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
252 | (1) |
|
Evidence Collection and Incident Response Procedures |
|
|
252 | (1) |
|
|
253 | (4) |
|
|
255 | (2) |
|
|
257 | (1) |
|
|
258 | (2) |
|
International Legal Issues |
|
|
260 | (3) |
|
|
263 | (2) |
|
|
265 | (1) |
|
Current Trends in International Cyber Law |
|
|
266 | (3) |
|
|
269 | (20) |
|
|
273 | (5) |
|
|
273 | (1) |
|
Increase in Sophistication |
|
|
273 | (1) |
|
Increases in Semantic DDoS Attacks |
|
|
274 | (1) |
|
|
274 | (1) |
|
|
275 | (1) |
|
|
276 | (1) |
|
|
277 | (1) |
|
Social, Moral, and Legal Issues |
|
|
278 | (1) |
|
Resources for Learning More |
|
|
279 | (7) |
|
|
279 | (2) |
|
|
281 | (1) |
|
Conferences and Workshops |
|
|
282 | (2) |
|
|
284 | (2) |
|
|
286 | (3) |
|
|
289 | (12) |
|
Appendix B: Survey of Commercial Defense Approaches |
|
|
301 | (22) |
|
B.1 Mazu Enforcer by Mazu Networks |
|
|
303 | (2) |
|
B.2 Peakflow by Arbor Networks |
|
|
305 | (4) |
|
B.3 WS Series Appliances by Webscreen Technologies |
|
|
309 | (2) |
|
B.4 Captus IPS by Captus Networks |
|
|
311 | (1) |
|
B.5 MANAnet Shield by CS3 |
|
|
312 | (3) |
|
B.6 Cisco Traffic Anomaly Detector XT and Cisco Guard XT |
|
|
315 | (3) |
|
B.7 Stealth Watch by Lancope |
|
|
318 | (1) |
|
|
318 | (5) |
|
|
323 | (12) |
|
C.1 2004 CSI/FBI Computer Crime and Security Survey |
|
|
324 | (1) |
|
C.2 Inferring Internet Denial-of-Service Activity |
|
|
325 | (4) |
|
C.3 A Framework for Classifying Denial-of-Service Attacks |
|
|
329 | (2) |
|
C.4 Observations and Experiences Tracking Denial-of-Service Attacks across a Regional ISP |
|
|
331 | (1) |
|
C.5 Report on the DDoS Attack on the DNS Root Servers |
|
|
332 | (2) |
|
|
334 | (1) |
References |
|
335 | (16) |
Index |
|
351 | |