Talk:Denial of service: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
imported>Sandy Harris
Line 18: Line 18:


: and [http://www.wired.com/threatlevel/2010/12/simplest-phones-open-to-%E2%80%9Csms-of-death%E2%80%9D/ Cell phone "SMS of Death"] [[User:Sandy Harris|Sandy Harris]] 23:35, 29 December 2010 (UTC)
: and [http://www.wired.com/threatlevel/2010/12/simplest-phones-open-to-%E2%80%9Csms-of-death%E2%80%9D/ Cell phone "SMS of Death"] [[User:Sandy Harris|Sandy Harris]] 23:35, 29 December 2010 (UTC)
== "Denial of money" over-use attack==
Bad Google/Amazon interaction yields large data transfers, high cost. [http://www.wired.com/wiredenterprise/2012/04/aws-bill-in-minutes/] [[User:Sandy Harris|Sandy Harris]] 02:54, 4 May 2012 (UTC)

Revision as of 20:54, 3 May 2012

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
To learn how to update the categories for this article, see here. To update categories, edit the metadata template.
 Definition An attack on a computer or communications system that tries to prevent the system delivering its normal services to its users, [d] [e]
Checklist and Archives
 Workgroup category Computers [Editors asked to check categories]
 Subgroup categories:  Security and Internet operations
 Talk Archive none  English language variant Canadian English

Great start!

May I suggest either substituting miscreant for Evildoer, or at least redirecting? While my personal preference would not be miscreant, I can't use my preference and stay family-friendly.

Nevertheless, when I was involved with a major industry project, with ISP and law enforcement involvement, we struggled to come up with a term that was "courtroom-safe", and the consensus seemed to be miscreant — a sufficiently obscure word that it tends not to have preconceptions.

Did you notice resource attack? There's some overlap.

Port scanning isn't exactly DOS, but I mention it in the context of network reconnaissance.

I can, if need be, do an article on (D)DoS detection and response on the network side; I have to remember now if I've already discussed some of the techniques such as uRPF, sinkholes, ingress filtering, backscatter, the different uses of NetFlow and SNMP, etc. Howard C. Berkowitz 00:59, 3 April 2009 (UTC)

Launching nuclear missiles, I must admit, is a very solid way to deny mail servers in the target area. Howard C. Berkowitz 02:53, 3 April 2009 (UTC)
Add this at some point. Evil URL shortener, Javascript DDoS. Sandy Harris 23:28, 20 December 2010 (UTC)
and Cell phone "SMS of Death" Sandy Harris 23:35, 29 December 2010 (UTC)

"Denial of money" over-use attack

Bad Google/Amazon interaction yields large data transfers, high cost. [1] Sandy Harris 02:54, 4 May 2012 (UTC)