Ch. 7 - Vocab Flashcards
amplification attack
sending a packet with a spoofed source address for the target system to intermediaries, generating multiple packets from each original packet
availability
system being accessible and usable on demand by authorized users
backscatter traffic botnet
echo response packets generated in response to a ping flood using randomly spoofed source addresses
denial of service
compromise availability by hindering the provision of some service
directed broadcast
an IP broadcast to all devices within a single directly-attached network or subnet
distributed denial of service
the use of multiple systems to generate denial of service attacks
DNS amplification attack
exploiting the behavior of the DNS protocol to convert a small request into a much larger response
flash crowd
where high traffic leading to a denial of service is a natural phenomenon
flooding attack
to overload the network capacity on some link to a server
Internet Control Message Protocol
used internet devices to communicate error information or updates to other devices
ICMP flood
flood of ICMP packets such as echo request packets
poison packet
packets whose structure triggers a bug in the system’s network handling software, causing it to crash
reflection attack
sends packets to an intermediary with a spoofed source address of the actual target system
slashdotted
as known as a flash crowded
source address spoofing
using a forged source address