Talk:Denial of service: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
(New page: {{subpages}})
 
imported>Howard C. Berkowitz
(→‎Great start!: new section)
Line 1: Line 1:
{{subpages}}
{{subpages}}
== Great start! ==
May I suggest either substituting [[miscreant]] for Evildoer, or at least redirecting? While my personal preference would not be miscreant, I can't use my preference and stay family-friendly.
Nevertheless, when I was involved with a major industry project, with ISP and law enforcement involvement, we struggled to come up with a term that was "courtroom-safe", and the consensus seemed to be miscreant — a sufficiently obscure word that it tends not to have preconceptions.
Did you notice [[resource attack]]? There's some overlap.
[[Port scanning]] isn't exactly DOS, but I mention it in the context of [[network reconnaissance]].
I can, if need be, do an article on (D)DoS detection and response on the network side; I have to remember now if I've already discussed some of the techniques such as uRPF, sinkholes, ingress filtering, backscatter, the different uses of NetFlow and SNMP, etc. [[User:Howard C. Berkowitz|Howard C. Berkowitz]] 00:59, 3 April 2009 (UTC)

Revision as of 18:59, 2 April 2009

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
To learn how to update the categories for this article, see here. To update categories, edit the metadata template.
 Definition An attack on a computer or communications system that tries to prevent the system delivering its normal services to its users, [d] [e]
Checklist and Archives
 Workgroup category Computers [Editors asked to check categories]
 Subgroup categories:  Security and Internet operations
 Talk Archive none  English language variant Canadian English

Great start!

May I suggest either substituting miscreant for Evildoer, or at least redirecting? While my personal preference would not be miscreant, I can't use my preference and stay family-friendly.

Nevertheless, when I was involved with a major industry project, with ISP and law enforcement involvement, we struggled to come up with a term that was "courtroom-safe", and the consensus seemed to be miscreant — a sufficiently obscure word that it tends not to have preconceptions.

Did you notice resource attack? There's some overlap.

Port scanning isn't exactly DOS, but I mention it in the context of network reconnaissance.

I can, if need be, do an article on (D)DoS detection and response on the network side; I have to remember now if I've already discussed some of the techniques such as uRPF, sinkholes, ingress filtering, backscatter, the different uses of NetFlow and SNMP, etc. Howard C. Berkowitz 00:59, 3 April 2009 (UTC)