Demystifying Denial-Of-Service attacks, part one
This paper provides an introduction to Denial of Service (DoS) attacks, their methodologies, common prevention techniques, and how they differ from Distributed Denial of Service (DDoS) Attacks. This article is intended to be a broad overview for the beginner or intermediate-level administrator on the different types of DoS attacks. 2005-12-14 http://www.securityfocus.com/infocus/1853 Software Firewalls: Made of Straw? Part 2 of 2 Part two looks at Layered Service Provider based Trojans hidden in the protocol stack, providing stealthy communication through an open firewall port. 2005-06-20 http://www.securityfocus.com/infocus/1840 Software Firewalls: Made of Straw? Part 1 of 2 This article looks at design issues with software firewalls that can render them useless in several ways. 2005-06-08 http://www.securityfocus.com/infocus/1839 Software Firewalls versus Wormhole Tunnels This article explains how the PCAP library on Windows can be used to render software firewalls and client VPN environments ineffective, easily bypassing traditional security measures. 2005-05-04 http://www.securityfocus.com/infocus/1831 The Perils of Deep Packet Inspection This paper looks at the evolution of firewall technology towards Deep Packet Inspection, and then discusses some of the security issues with this evolving technology. 2005-01-11 http://www.securityfocus.com/infocus/1817 Packet Crafting for Firewall & IDS Audits (Part 2 of 2) This article is the second of a two-part series that will discuss various methods to test the integrity of your firewall and IDS using low-level TCP/IP packet crafting tools and techniques. 2004-07-19 http://www.securityfocus.com/infocus/1791 Packet Crafting for Firewall & IDS Audits (Part 1 of 2) This article is the first of a two-part series that will discuss various methods to test the integrity of your firewall and IDS using low-level TCP/IP packet crafting tools and techniques. 2004-06-28 http://www.securityfocus.com/infocus/1787 Transparent, Bridging Firewall Devices This article examines the concept of a transparent or bridging firewall which sits hidden in-line with the network it protects. 2003-10-15 http://www.securityfocus.com/infocus/1737 Hardening the TCP/IP stack to SYN attacks This article discusses methods of hardening the TCP/IP stack of various operating systems to make servers more resistant to SYN flooding and SYN spoofing Denial of Service (DOS) attacks. 2003-09-10 http://www.securityfocus.com/infocus/1729 Slow Down Internet Worms With Tarpits This timely article discusses how to slow the spread of Internet worms using a tarpit and IPtables on Linux. A similar approach could potenially be used with tarpits on Windows platforms, Solaris, OpenBSD, and others. 2003-08-21 http://www.securityfocus.com/infocus/1723 |
|
Privacy Statement |