Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Các hệ thống thông tin là nơi có thể xảy ra và lan tràn nhanh chóng việc lạm dụng tài nguyên (các thông tin di chuyển vô hình trên mạng hoặc lưu trữ hữu hình trong các vật liệu) và lạm dụng tài sản (các máy tính, thiết bị mạng, thiết bị ngoại vi, các phần mềm của cơ quan hoặc người sở hữu hệ thống). | A amplification attack anomaly-based IDS For More Information You can find THC online at www.thehackerschoice.com. See Also scanner amplification attack Any type of attack that magnifies the effect of a single attacking host. Overview Amplification attacks work by having one packet generate multiple responses. The resulting effect is that a single attacking host appears as multiple hosts with the goal of intensifying the effect of the attack to bring down entire networks. Distributed denial-of-service DDoS attacks are classic examples of amplification attacks in which intermediary compromised hosts are used to multiply the malicious intent of a single intruder. The Smurf attack is another type of amplification attack and relies on the fact that a single spoofed Internet Control Message Protocol ICMP echo request will cause multiple hosts on a network to generate ICMP echo replies the amplification factor here being the number of accessible hosts on the compromised network. See Also distributed denial of service DDoS Smurf attack Annual Computer Security Applications Conference ACSAC An annual conference on computer security organized and sponsored by Applied Computer Security Associates ACSA . Overview Since 1985 the Annual Computer Security Applications Conference ACSAC has helped advance the principles and practices of computer security. Conference attendees work primarily in technical fields and include engineers researchers and practitioners in the field of computer security. Attendance at ACSAC averages around 250 people and is heavily weighted toward industry and government. For More Information For information on upcoming conference schedules and registration see www.acsac.org. See Also Applied Computer Security Associates ACSA anomaly-based IDS An intrusion detection system IDS that uses a baseline instead of signatures to detect intrusions. Overview While signature-based or rule-based IDSs are more common they are limited to recognizing known attacks and .