Distributed Denial of Service Attacks


Click here to start

Table of Contents

Distributed Denial of Service Attacks

What Are DDoS Tools?

How They Work

Agile Attackers

Source-Address Spoofing

How They Talk

Deploying DDOS

Detecting DDOS Tools

What are the Strong Defenses?

What Can ISPs Do?

Traffic Volume Monitoring

Can We Do Better Some Day?

ICMP Traceback

Enhanced Congestion Control


Author: Steve Michael Bellovin

Email: smb@research.att.com

Home Page: http://www.research.att.com/~smb

Download presentation source