|Denial of Service
Denial of Service developments including description,
impact, and solutions.
Strategies to protect against distributed
denial of service (DDoS) attacks. This article
applies primarily to sites using Cisco equipment.
Class Action Lawsuit
Organization and discussion of class-action
lawsuits by victims of DDOS attacks.
Knowledge base: including news articles, white
papers, and advisories.
Denial of Service Attacks
How to assess risk and avoid unwitting
participation in this relatively new tactic.
of Service Database
Details of many attacks: categorized by platform
affected and using OSAT notation. No longer
of Service (DoS) Resource Page
Collection of articles and links about Denial
of Service attacks
of Service Help Page
Advice for victims of Denial Of Service Attacks,
geared towards users of IRC (Internet Relay
Denial of Service (DDoS) Attacks and Tools
A bibliography of recent papers and advisories
on DDoS attacks and tools, by David Dittrich
of the University of Washington (USA).
Tools and patches to protect a person's computer
from hackers, Denial of Service, and other
Denial of Service Investigation and Exploration
Analysis and investigation of the DoS threat
posed by Windows XP, and reports and logs
from when GRC.com was the victim of a DDoS
An interview on hacking and denial of service
attacks with Brian Martin and David Dittrich.
Available in text and various forms of audio.
Storm Center - Slammer Worm Analysis
Detailed analysis of the Slammer worm responsible
for recent widespread denial of service activities
Latest bugfixes for Microsoft Windows, including
fixes for some possible DoS attacks.
Infrastructure Protection Center (NIPC)
The National Infrastructure Protection Center
(NIPC) serves as a national critical infrastructure
threat assessment, warning, vulnerability,
and law enforcement investigation and response
Public service which proactively scans for
networks acting as smurf amplifiers.
A simple, effective, and straightforward method
for network administrators to prohibit DoS
attacks which use forged IP addresses.
Proposed 'First-Aid' Security Measures Against
Distributed Denial Of Service Attacks
Whitepaper detailing "easy and fast to implement
methods to protect against those attacks."
Hat Linux General Security Advisory
Updated bind packages fixing DoS attack.
Institute Global Incident Analysis Center
Special notice and analysis of Rootkit/Smurf
Payload Toolkit v 1.1.
Site maintains an extensive database of vunerabilities
and solutions including Denial Of Service
The SAR lets you probe Internet connected
IP networks to see whether or not they are
configured in a way that will allow perpetrators
to use them for smurf amplification.
White paper describing and giving information
on how to minimize the effects of smurf attacks.
An analysis of "stacheldraht", a distributed
denial of service attack tool, based on source
code from the "Tribe Flood Network" distributed
denial of service attack tool.
An analysis of the DoS Project's trin00 master/slave
programs, which implement a distributed network
denial of service tool.
Definition of Denial of Service
Definition plus discussion of various types
of DoS attacks and how they work, including
Buffer Overflow, SYN, Teardrop and Smurf.
Free, open source tool that can tell a zombie
system to stop flooding. Zombie Zapper works
against Trinoo, TFN, Stacheldraht, Troj_Trinoo
(the trinoo daemon ported to Windows), and
How to Stop a Service Denial Attack Before
It Stops You
Shawn P. McCarthy provides a quick overview
of various kinds of DDOS attacks. He also
explains why defending against this type of
attack requires upstream infrastructure providers
to cooperate with the victim. (July
A malicious Java-based applet can keep Windows
users from accessing Domain Name Servers on
the Web. (February 23, 2001)
Is Neither Dead Nor Forgotten
How DDoS attacks have developed over the past
year, and what has been learned; preparation
is essential to prevention. [NetworkMagazine.com]
(February 5, 2001)
Stunt DoS Attack
InternetWeek article written in the aftermath
of the Denial of Service attack on Microsoft's
domain name servers discusses various ways
to combat these tactics. (February
Incident Note: DoS Attacks Using Nameservers
Description of how intruders are using nameservers
to execute packet flooding denial of service
attacks. (January 15, 2001)
Denial of Service Attacks
Discussion of the main DoS methods and how
to protect your PCs and servers from them.
[NetworkMagazine.com] (December 5,
- Distributed Denial
of Service Attacks
A DDOS exploit multiplies the disruptive power
of denial of service attacks. The article
discusses methods used and how to detect them.
[NetworkMagazine.com] (March 1, 2000)
Ubiquity - Distributed Denial-of-Service Attacks
Article by M. E. Kabay about the effect of
DDoS attacks on major e-commerce sites, and
the legal ramifications thereof. (February