Security in Computer Networks

8.7 Attacks and Countermeasures

Home | Introduction | 8.1 What Is Network Security? | 8.2 Principles of Cryptography | 8.3 Authentication | 8.4 Integrity | 8.5 Key Distribution and Certification | 8.6 Access Control: Firewalls | 8.7 Attacks and Countermeasures | 8.8 Security in Many Layers: Case Studies

Some of the most sensational security attacks, such as the CodeRed [CERT 2001-19], the Melissa virus [CERT 1999-04], and the Slammer worm [CERT 2003-04, Moore 2003] use the Internet to spread themselves but attack operating systems or application software itself.  This being a networking book, our focus will be on attacks that exploit, cripple, or involve the network in some special way.

8.7.1 Mapping

8.7.2 Packet Sniffing

8.7.3 Spoofing

8.7.4 Denial-of-Service and Distributed Denial-of-Service Attacks

8.7.5 Hijacking