Title :
Next generation DDoS Web based attacks
Author :
Reynolds, M. Sedano
Abstract :
Information assurance requires more than just "best practices in security" in essence, "essential security practices" is imperative for implementing security controls which are costly to acquire, implement and maintain; and costs in the limitations placed on an organization or business. These same controls imposes infringements on users as well. Many security programs create excessive costs or limitations that create severe conflicts with the core business or enterprise. This can happen by spreading security resources too thinly across too many unimportant vulnerabilities, imposing excessive controls where not required, or failing to effectively mitigate meaningful risks. We only suggest to the reader the evolution of intrusions and in particular, theft, fraud and denial of services (DoS). Distributed denial of services (DDoS) involves multiple "innocent accomplices".
Keywords :
Internet; authorisation; computer crime; distributed processing; fraud; DDoS; Web-based attack; distributed denial of service; fraud; information assurance; intrusion evolution; security control; security resource; Authorization; Computer crime; Costs; Electric breakdown; HTML; IEEE members; Information security; Law enforcement; Layout; Surges;
Conference_Titel :
Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society
Print_ISBN :
0-7803-7808-3
DOI :
10.1109/SMCSIA.2003.1232423