Talk:Denial of service: Difference between revisions
imported>Sandy Harris (New page: {{subpages}}) |
imported>Howard C. Berkowitz (→Great start!: new section) |
||
Line 1: | Line 1: | ||
{{subpages}} | {{subpages}} | ||
== Great start! == | |||
May I suggest either substituting [[miscreant]] for Evildoer, or at least redirecting? While my personal preference would not be miscreant, I can't use my preference and stay family-friendly. | |||
Nevertheless, when I was involved with a major industry project, with ISP and law enforcement involvement, we struggled to come up with a term that was "courtroom-safe", and the consensus seemed to be miscreant — a sufficiently obscure word that it tends not to have preconceptions. | |||
Did you notice [[resource attack]]? There's some overlap. | |||
[[Port scanning]] isn't exactly DOS, but I mention it in the context of [[network reconnaissance]]. | |||
I can, if need be, do an article on (D)DoS detection and response on the network side; I have to remember now if I've already discussed some of the techniques such as uRPF, sinkholes, ingress filtering, backscatter, the different uses of NetFlow and SNMP, etc. [[User:Howard C. Berkowitz|Howard C. Berkowitz]] 00:59, 3 April 2009 (UTC) |
Revision as of 18:59, 2 April 2009
Great start!
May I suggest either substituting miscreant for Evildoer, or at least redirecting? While my personal preference would not be miscreant, I can't use my preference and stay family-friendly.
Nevertheless, when I was involved with a major industry project, with ISP and law enforcement involvement, we struggled to come up with a term that was "courtroom-safe", and the consensus seemed to be miscreant — a sufficiently obscure word that it tends not to have preconceptions.
Did you notice resource attack? There's some overlap.
Port scanning isn't exactly DOS, but I mention it in the context of network reconnaissance.
I can, if need be, do an article on (D)DoS detection and response on the network side; I have to remember now if I've already discussed some of the techniques such as uRPF, sinkholes, ingress filtering, backscatter, the different uses of NetFlow and SNMP, etc. Howard C. Berkowitz 00:59, 3 April 2009 (UTC)