[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: flooding attacks and threats doc (was Re: Comments on draft-bagnulo-multi6dt-hba-00.txt
This is good for me
thanks, marcelo
El 19/11/2004, a las 20:10, Erik Nordmark escribió:
Since nobody suggested text, I've added the second paragraph below in
section 4.3:
<existing paragraph>
An attacker can use the ability to perform redirection to cause
overload on an unrelated third party. For instance, if A and B
are communicating then the attacker X might be able to convince A to
send the packets intended for B to some third node C.
While this might seem harmless at first, since X could just flood C
with
packets directly, there are a few aspects of these attacks that cause
concern.
<added paragraph>
Such an attack might be against the resources of a particular host
i.e., C
in the example above, or it might be against the network infrastructure
towards a particular IP address prefix, by overloading the routers or
links
even though there is no host at the address being targeted.
Erik
------------------------------------------
Please note that my former email address
mbagnulo@ing.uc3m.es is no longer in use
Please send mail to:
marcelo at it dot uc3m dot es
------------------------------------------