Talk:Denial of service: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
(New page: {{subpages}})
 
imported>Sandy Harris
 
(6 intermediate revisions by 2 users not shown)
Line 1: Line 1:
{{subpages}}
{{subpages}}
== Great start! ==
May I suggest either substituting [[miscreant]] for Evildoer, or at least redirecting? While my personal preference would not be miscreant, I can't use my preference and stay family-friendly.
Nevertheless, when I was involved with a major industry project, with ISP and law enforcement involvement, we struggled to come up with a term that was "courtroom-safe", and the consensus seemed to be miscreant — a sufficiently obscure word that it tends not to have preconceptions.
Did you notice [[resource attack]]? There's some overlap.
[[Port scanning]] isn't exactly DOS, but I mention it in the context of [[network reconnaissance]].
I can, if need be, do an article on (D)DoS detection and response on the network side; I have to remember now if I've already discussed some of the techniques such as uRPF, sinkholes, ingress filtering, backscatter, the different uses of NetFlow and SNMP, etc. [[User:Howard C. Berkowitz|Howard C. Berkowitz]] 00:59, 3 April 2009 (UTC)
:Launching nuclear missiles, I must admit, is a very solid way to deny mail servers in the target area. [[User:Howard C. Berkowitz|Howard C. Berkowitz]] 02:53, 3 April 2009 (UTC)
: Add this at some point. [http://spareclockcycles.org/2010/12/19/d0z-me-the-evil-url-shortener/ Evil URL shortener], Javascript DDoS. [[User:Sandy Harris|Sandy Harris]] 23:28, 20 December 2010 (UTC)
: and [http://www.wired.com/threatlevel/2010/12/simplest-phones-open-to-%E2%80%9Csms-of-death%E2%80%9D/ Cell phone "SMS of Death"] [[User:Sandy Harris|Sandy Harris]] 23:35, 29 December 2010 (UTC)
== "Denial of money" over-use attack==
Bad Google/Amazon interaction yields large data transfers, high cost. [http://www.wired.com/wiredenterprise/2012/04/aws-bill-in-minutes/] [[User:Sandy Harris|Sandy Harris]] 02:54, 4 May 2012 (UTC)
== Largest attack on record? ==
"A squabble between a group fighting spam and a Dutch company that hosts Web sites said to be sending spam has escalated into one of the largest computer attacks on the Internet, causing widespread congestion and jamming crucial infrastructure around the world."
Spamhaus is a controversial spam-blocking service. Cyberbunker offers hosting services to any Web site “except child porn and anything related to terrorism”. They host some spammers, so Spamhaus blocked them. Then all hell broke loose. [http://www.nytimes.com/2013/03/27/technology/internet/online-dispute-becomes-internet-snarling-attack.html?_r=0] [[User:Sandy Harris|Sandy Harris]] 14:49, 27 March 2013 (UTC)
: Scientific American "The reality is less exciting, though still serious." [http://www.scientificamerican.com/article.cfm?id=the-truth-behind-the-biggest-cyberattack-in-history] [[User:Sandy Harris|Sandy Harris]] 18:33, 28 March 2013 (UTC)

Latest revision as of 12:33, 28 March 2013

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
To learn how to update the categories for this article, see here. To update categories, edit the metadata template.
 Definition An attack on a computer or communications system that tries to prevent the system delivering its normal services to its users, [d] [e]
Checklist and Archives
 Workgroup category Computers [Editors asked to check categories]
 Subgroup categories:  Security and Internet operations
 Talk Archive none  English language variant Canadian English

Great start!

May I suggest either substituting miscreant for Evildoer, or at least redirecting? While my personal preference would not be miscreant, I can't use my preference and stay family-friendly.

Nevertheless, when I was involved with a major industry project, with ISP and law enforcement involvement, we struggled to come up with a term that was "courtroom-safe", and the consensus seemed to be miscreant — a sufficiently obscure word that it tends not to have preconceptions.

Did you notice resource attack? There's some overlap.

Port scanning isn't exactly DOS, but I mention it in the context of network reconnaissance.

I can, if need be, do an article on (D)DoS detection and response on the network side; I have to remember now if I've already discussed some of the techniques such as uRPF, sinkholes, ingress filtering, backscatter, the different uses of NetFlow and SNMP, etc. Howard C. Berkowitz 00:59, 3 April 2009 (UTC)

Launching nuclear missiles, I must admit, is a very solid way to deny mail servers in the target area. Howard C. Berkowitz 02:53, 3 April 2009 (UTC)
Add this at some point. Evil URL shortener, Javascript DDoS. Sandy Harris 23:28, 20 December 2010 (UTC)
and Cell phone "SMS of Death" Sandy Harris 23:35, 29 December 2010 (UTC)

"Denial of money" over-use attack

Bad Google/Amazon interaction yields large data transfers, high cost. [1] Sandy Harris 02:54, 4 May 2012 (UTC)

Largest attack on record?

"A squabble between a group fighting spam and a Dutch company that hosts Web sites said to be sending spam has escalated into one of the largest computer attacks on the Internet, causing widespread congestion and jamming crucial infrastructure around the world."

Spamhaus is a controversial spam-blocking service. Cyberbunker offers hosting services to any Web site “except child porn and anything related to terrorism”. They host some spammers, so Spamhaus blocked them. Then all hell broke loose. [2] Sandy Harris 14:49, 27 March 2013 (UTC)

Scientific American "The reality is less exciting, though still serious." [3] Sandy Harris 18:33, 28 March 2013 (UTC)