english deutsch
10 Proposed 'First-Aid' Security Measure
White paper detailing "easy and fast to implement methods to protect against those attacks." [PDF format]
ACM: Ubiquity - Distributed Denial-of-Service Atta
Article by M. E. Kabay about the effect of DDoS attacks on major e-commerce sites, and the legal ramifications thereof.
CERT Advisory CA-2000-01 Denial-of-Service Develop
Denial of Service developments including description, impact, and solutions.
CERT Incident Note: DoS Attacks Using Nameservers
Description of how intruders use name servers to execute packet flooding denial of service attacks.
Cisco
Strategies to protect against distributed denial of service (DDoS) attacks. This article applies primarily to sites using Cisco equipment.
DDoS Detection research (IDS, SYN, DRDoS, TFN2K)
An academic research paper on DDoS detection including attack simulation based on TFN2K, detection platform and analysis. [Requires PowerPoint]
DDoS Is Neither Dead Nor Forgotten
February 1991 article on state of DDoS attacks, and what has been learned to that point.
DDoS World
Knowledge base: including news articles, white papers, and advisories.
Defeating DDoS
An illustrated white paper describing Distributed Denial of Service (DDoS) attack methodology and prevention.
Defying Denial of Service Attacks
Discussion of the main DoS methods and how to protect your PCs and servers from them. [NetworkMagazine.com]
Denial of Service (DoS) on the Internet
Academic paper and slides on Denial of Service attacks.
Denial of Service (DoS) Resource Page
Collection of articles and links about Denial of Service attacks
Denial of Service attacks and countermeasures
Presentation notes and illustrations on denial of service attacks and countermeasures given at the University of Rome "La Sapienza"
Denial of Service Attacks White Papers, Webcasts a
Research the latest Denial of Service Attacks technologies, tools and techniques. Read white papers, case studies, webcasts and product information from multiple vendors.
Denial of Service Database
Details of many attacks: categorized by platform affected and using OSAT notation. No longer updated.
Denial of Service Help Page
Advice for victims of Denial Of Service Attacks, geared towards users of IRC (Internet Relay Chat)
Denial-of-service attack
Description of DDoS and prevention resources from Wikipedia Encyclopedia.
Distributed Denial of Service (DDoS) Attacks/tools
Link resources for understanding, diagnosing and preventing DDoS attacks.
Distributed Denial of Service - Protecting Critica
White paper describing and giving detailed information on distributed denial of service (DDoS) attacks and prevention and intervention methods. Illustrated.
Distributed Denial of Service Attacks
A DDoS exploit multiplies the disruptive power of denial of service attacks. The article discusses methods used and how to detect them. [NetworkMagazine.com]
DoShelp.com
Tools and patches to protect a person's computer from hackers, Denial of Service, and other intrusions.
GCN.com: How to Stop a Service Denial Attack Befor
Shawn P. McCarthy provides a quick overview of various kinds of Distributed Denial of Service (DDoS) attacks. He also explains why defending against this type of attack requires upstream infrastructure providers to cooperate with the victim.
GRC.com: Denial of Service Investigation and Explo
Analysis and investigation of the denial of service threat posed by Windows XP, and reports and logs from when GRC.com was the victim of a DDoS attack.
Hacking the DoS
An interview on hacking and denial of service attacks with Brian Martin and David Dittrich from February 22, 2000. Available in text and various forms of audio.
Magnification Attacks: smurf and fraggle
Security white paper describing some common magnification (smurf) attacks, what they are, and how to avoid them.
Microsoft Windows Update
Latest bug fixes for Microsoft Windows, including fixes for some possible DoS attacks.
Netscan.org
Public service which proactively scans for networks acting as smurf amplifiers.
Network Ingress Filtering
A simple, effective, and straightforward method for network administrators to prohibit DoS attacks which use forged IP addresses.
Protecting Networks from DoS Attacks
Solution paper on the use of bandwidth management to protect networks from distributed denial of service attacks and malicious traffic.
Red Hat Linux General Security Advisory
Updated bind packages for fixing DoS attack vulnerability in versions prior to 8.2.2_P7.
Sans Institute Global Incident Analysis Center
Special notice and analysis of Rootkit/Smurf Payload Toolkit v 1.1.
SecurityFocus
Site maintains an extensive database of vulnerabilities and solutions including Denial Of Service attacks.
Smurf Amplifier Registry
The Smurf Amplifier Registry (SAR) lets you probe Internet connected IP networks to see whether or not they are configured in a way that will allow perpetrators to use them for smurf amplification.
Smurf Attack Information
White paper describing and providing practical information on how to minimize the effects of smurf attacks.
Stacheldraht Analysis
An analysis of "stacheldraht", a distributed denial of service attack tool, based on source code from the "Tribe Flood Network" distributed denial of service attack tool.
Tools Stunt DoS Attack
InternetWeek article written in the aftermath of the Denial of Service attack on Microsoft's domain name servers discusses various ways to combat these tactics.
Trinoo Analysis
An analysis of the DoS Project's trin00 master/slave programs, which implement a distributed network denial of service tool.
Understanding Denial-of-Service Attacks
A brief overview on identifying DoS attacks from the US-CERT (United States Computer Emergency Response Team).
Webscreen Technology
Offers filtering appliances with DDoS mitigation features.
Whatis Definition of Denial of Service
Definition plus discussion of various types of DoS attacks and how they work, including Buffer Overflow, SYN, Teardrop and Smurf.
Zombie Zapper
Free, open source tool that can tell a zombie system to stop flooding. Zombie Zapper works against Trinoo, TFN, Stacheldraht, Troj_Trinoo (the trinoo daemon ported to Windows), and Shaft.