Servis dışı bırakma saldırısı: Revizyonlar arasındaki fark

[kontrol edilmemiş revizyon][kontrol edilmemiş revizyon]
İçerik silindi İçerik eklendi
SogukGece (mesaj | katkılar)
Değişiklik özeti yok
Aacan (mesaj | katkılar)
k Referans kısmı eklendi. ( References is added.)
205. satır:
Pek çok ülkede Ddos saldırısı ciddi bir bilişim suçudur ve cezası vardır. Fakat saldırının doğal yapısı gereği saldırıyı yöneten kişilerin tespitini yapmak diğer saldırı yöntemleriyle kıyaslandığında daha zordur.
 
== Kaynakça  ==
# [https://www.us-cert.gov/ncas/tips/ST04-015 "Understanding Denial-of-Service Attacks"]. US-CERT. 6 February 2013. Retrieved 26 May 2016.
<ref>https://en.wikipedia.org/wiki/Denial-of-service_attack</ref>
#  Prince, Matthew (25 April 2016). [https://blog.cloudflare.com/empty-ddos-threats-meet-the-armada-collective/ "Empty DDoS Threats: Meet the Armada Collective"]. ''CloudFlare''. Retrieved 18 May 2016.
# [https://web.archive.org/web/20140311070205/http://www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ "Brand.com President Mike Zammuto Reveals Blackmail Attempt"]. 5 March 2014. Archived from [http://www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ the original] on 11 March 2014.
# [https://web.archive.org/web/20140513044100/http://dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/? "Brand.com's Mike Zammuto Discusses Meetup.com Extortion"]. 5 March 2014. Archived from [http://dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/ the original] on 13 May 2014.
# [http://www.radicalphilosophy.com/article/the-philosophy-of-anonymous "The Philosophy of Anonymous"]. Radicalphilosophy.com. 2010-12-17. Retrieved 2013-09-10.
# Taghavi Zargar, Saman (November 2013). [http://d-scholarship.pitt.edu/19225/1/FinalVersion.pdf "A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks"] (PDF). IEEE COMMUNICATIONS SURVEYS & TUTORIALS. pp. 2046–2069. Retrieved 2014-03-07.
# Smith, Steve. [https://tqaweekly.com/episodes/season5/tqa-se5ep11.php "5 Famous Botnets that held the internet hostage"]. tqaweekly. Retrieved November 20, 2014.
# Goodin, Dan (28 September 2016). [http://arstechnica.com/security/2016/09/botnet-of-145k-cameras-reportedly-deliver-internets-biggest-ddos-ever/ "Record-breaking DDoS reportedly delivered by >145k hacked cameras"]. Ars Technica. [https://web.archive.org/web/20161002000235/http://arstechnica.com/security/2016/09/botnet-of-145k-cameras-reportedly-deliver-internets-biggest-ddos-ever/ Archived] from the original on 2 October 2016.
# Khandelwal, Swati (26 September 2016). [https://thehackernews.com/2016/09/ddos-attack-iot.html "World's largest 1 Tbps DDoS Attack launched from 152,000 hacked Smart Devices"]. The Hacker News. [https://web-beta.archive.org/web/20160930031903/https://thehackernews.com/2016/09/ddos-attack-iot.html Archived] from the original on 30 September 2016.
# Kiyuna and Conyers (2015). ''Cyberwarfare Sourcebook''. [[International Standard Book Number|ISBN]] [[%C3%96zel%3ABookSources/1329063945|1329063945]].
# Gold, Steve (21 August 2014). [http://www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/ "Video games company hit by 38-day DDoS attack"]. ''SC Magazine UK''. Retrieved 4 February 2016.
# Krebs, Brian (August 15, 2015). [http://krebsonsecurity.com/2015/08/stress-testing-the-booter-services-financially/ "Stress-Testing the Booter Services, Financially"]. ''Krebs on Security''. Retrieved 2016-09-09.
# McDowell, Mindi (November 4, 2009). [http://www.us-cert.gov/ncas/tips/st04-015 "Cyber Security Tip ST04-015 - Understanding Denial-of-Service Attacks"]. [[United States Computer Emergency Readiness Team]]. [https://web.archive.org/web/20131104052804/http://www.us-cert.gov/ncas/tips/st04-015 Archived] from the original on 2013-11-04. Retrieved December 11, 2013.
# Dittrich, David (December 31, 1999). [http://staff.washington.edu/dittrich/misc/stacheldraht.analysis.txt "The "stacheldraht" distributed denial of service attack tool"]. University of Washington. Retrieved 2013-12-11.
# [http://aws.amazon.com/cloudwatch/ Amazon CloudWatch"]. ''Amazon Web Services, Inc''.
# Glenn Greenwald (2014-07-15). [https://theintercept.com/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/ "HACKING ONLINE POLLS AND OTHER WAYS BRITISH SPIES SEEK TO CONTROL THE INTERNET"]. The Intercept_. Retrieved 2015-12-25.
# ''Encyclopaedia Of Information Technology''. Atlantic Publishers & Distributors. 2007. p. 397. [[International Standard Book Number|ISBN]] [[Özel:BookSources/81-269-0752-5|81-269-0752-5]].
# Schwabach, Aaron (2006). ''Internet and the Law''. ABC-CLIO. p. 325. [[International Standard Book Number|ISBN]] [[Özel:BookSources/1-85109-731-7|1-85109-731-7]].
# Lu, Xicheng; Wei Zhao (2005). ''Networking and Mobile Computing''. Birkhäuser. p. 424. [[International Standard Book Number|ISBN]] [[Özel:BookSources/3-540-28102-9|3-540-28102-9]].
# [http://blog.cloudbric.com/2015/08/has-your-website-been-bitten-by-zombie.html "Has Your Website Been Bitten By a Zombie?"]. Cloudbric. 3 August 2015. Retrieved 15 September 2015.
# Boyle, Phillip (2000). [http://www.sans.org/resources/idfaq/trinoo.php "SANS Institute – Intrusion Detection FAQ: Distributed Denial of Service Attack Tools: n/a"]. SANS Institute. Retrieved 2008-05-02.
# Leyden, John (2004-09-23). [http://www.theregister.co.uk/2004/09/23/authorize_ddos_attack/ "US credit card firm fights DDoS attack"]. ''The Register''. Retrieved 2011-12-02.
# Swati Khandelwal (23 October 2015). [http://thehackernews.com/2015/10/cctv-camera-hacking.html "Hacking CCTV Cameras to Launch DDoS Attacks"]. ''The Hacker News''.
# Zeifman, Igal; Gayer, Ofer; Wilder, Or (21 October 2015). [https://www.incapsula.com/blog/cctv-ddos-botnet-back-yard.html "CCTV DDoS Botnet In Our Own Back Yard"]. ''incapsula.com''.
# [http://blog.cloudbric.com/2015/09/whos-behind-ddos-attacks-and-how-can.html Who's Behind DDoS Attacks and How Can You Protect Your Website?"]. Cloudbric. 10 September 2015. Retrieved 15 September 2015.
# Solon, Olivia (9 September 2015). [https://www.bloomberg.com/news/articles/2015-09-09/bitcoin-ddos-ransom-demands-raise-dd4bc-profile?mod=djemRiskCompliance "Cyber-Extortionists Targeting the Financial Sector Are Demanding Bitcoin Ransoms"]. Bloomberg. Retrieved 15 September 2015.
# Greenberg, Adam (14 September 2015). [http://www.scmagazineuk.com/akamai-warns-of-increased-activity-from-ddos-extortion-group/article/438333/ "Akamai warns of increased activity from DDoS extortion group"]. SC Magazine. Retrieved 15 September 2015.
# [https://www.owasp.org/images/4/43/Layer_7_DDOS.pdf "OWASP Plan - Strawman - Layer_7_DDOS.pdf"] (PDF). ''Open Web Application Security Project''. 18 March 2014. Retrieved 18 March 2014.
# [https://web.archive.org/web/20100914222536/http://anml.iu.edu/ddos/types.html "Types of DDoS Attacks"]. ''Distributed Denial of Service Attacks(DDoS) Resources, Pervasive Technology Labs at Indiana University''. Advanced Networking Management Lab (ANML). December 3, 2009. Archived from [http://anml.iu.edu/ddos/types.html the original] on 2010-09-14. Retrieved December 11, 2013.
# Paul Sop (May 2007). [https://web.archive.org/web/20070803175513/http://www.prolexic.com/news/20070514-alert.php "Prolexic Distributed Denial of Service Attack Alert"]. ''Prolexic Technologies Inc''. Prolexic Technologies Inc. Archived from [http://www.prolexic.com/news/20070514-alert.php the original] on 2007-08-03. Retrieved 2007-08-22.
# Robert Lemos (May 2007). [http://www.securityfocus.com/news/11466 "Peer-to-peer networks co-opted for DOS attacks"]. SecurityFocus. Retrieved 2007-08-22.
# Fredrik Ullner (May 2007). [http://dcpp.wordpress.com/2007/05/22/denying-distributed-attacks/ "Denying distributed attacks"]. DC++: Just These Guys, Ya Know?. Retrieved 2007-08-22.
# Leyden, John (2008-05-21). [http://www.theregister.co.uk/2008/05/21/phlashing/ "Phlashing attack thrashes embedded systems"]. ''The Register''. Retrieved 2009-03-07.
# Jackson Higgins, Kelly (May 19, 2008). [https://web.archive.org/web/20081208002732/http://www.darkreading.com/security/management/showArticle.jhtml?articleID=211201088 "Permanent Denial-of-Service Attack Sabotages Hardware"]. Dark Reading. Archived from [http://www.darkreading.com/document.asp?doc_id=154270&WT.svl=news1_1 the original] on December 8, 2008.
# [https://web.archive.org/web/20090201173324/http://eusecwest.com/speakers.html#PhlashDance "EUSecWest Applied Security Conference: London, U.K."]. EUSecWest. 2008. Archived from [http://eusecwest.com/speakers.html#PhlashDance the original] on 2009-02-01.
# Rossow, Christian (February 2014). [http://www.internetsociety.org/sites/default/files/01_5.pdf "Amplification Hell: Revisiting Network Protocols for DDoS Abuse"] (PDF). Internet Society. Retrieved 4 February 2016.
# Paxson, Vern (2001). [http://www.icir.org/vern/papers/reflectors.CCR.01/reflectors.html "An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks"]. ICIR.org.
# [http://www.us-cert.gov/ncas/alerts/TA14-017A "Alert (TA14-017A) UDP-based Amplification Attacks"]. US-CERT. July 8, 2014. Retrieved 2014-07-08.
# van Rijswijk-Deij, Roland (2014). [[doi:10.1145/2663716.2663731|"DNSSEC and its potential for DDoS attacks - a comprehensive measurement study"]]. ACM Press.
# Adamsky, Florian (2015). [https://www.usenix.org/conference/woot15/workshop-program/presentation/p2p-file-sharing-hell-exploiting-bittorrent "P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks"].
# Vaughn, Randal; Evron, Gadi (2006). [https://web.archive.org/web/20101214074629/http://www.isotf.org/news/DNS-Amplification-Attacks.pdf "DNS Amplification Attacks"] (PDF). ISOTF. Archived from [http://www.isotf.org/news/DNS-Amplification-Attacks.pdf the original] (PDF) on 2010-12-14.
# [http://www.us-cert.gov/ncas/alerts/TA13-088A "Alert (TA13-088A) DNS Amplification Attacks"]. US-CERT. July 8, 2013. Retrieved 2013-07-17.
# Yu Chen; Kai Hwang; Yu-Kwong Kwok (2005). "Filtering of shrew DDoS attacks in frequency domain". ''The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l''. pp. 8 pp. [[Digital object identifier|doi]]:[[doi:10.1109/LCN.2005.70|10.1109/LCN.2005.70]]. [[International Standard Book Number|ISBN]] [[Özel:BookSources/0-7695-2421-4|0-7695-2421-4]].
# Ben-Porat, U.; Bremler-Barr, A.; Levy, H. (2013-05-01). [http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6158635 "Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks"]. ''IEEE Transactions on Computers''. '''62''' (5): 1031–1043. [[Digital object identifier|doi]]:[[doi:10.1109/TC.2012.49|10.1109/TC.2012.49]]. [[International Standard Serial Number|ISSN]] [https://www.worldcat.org/issn/0018-9340 0018-9340].
# orbitalsatelite. [[sourceforge:projects/slow-http-test/|"Slow HTTP Test"]]. ''SourceForge''.
# [[rfc:4987|"RFC 4987 – TCP SYN Flooding Attacks and Common Mitigations"]]. Tools.ietf.org. August 2007. Retrieved 2011-12-02.
# [http://www.cert.org/historical/advisories/ca-1997-28.cfm "CERT Advisory CA-1997-28 IP Denial-of-Service Attacks"]. CERT. 1998. Retrieved July 18, 2014.
# [http://www.zdnet.com/blog/security/windows-7-vista-exposed-to-teardrop-attack/4222 "Windows 7, Vista exposed to 'teardrop attack'"]. ZDNet. September 8, 2009. Retrieved 2013-12-11.
# [http://www.microsoft.com/technet/security/advisory/975497.mspx "Microsoft Security Advisory (975497): Vulnerabilities in SMB Could Allow Remote Code Execution"]. Microsoft.com. September 8, 2009. Retrieved 2011-12-02.
# [https://www.fbi.gov/newark/press-releases/2010/nk051110.htm FBI — Phony Phone Calls Distract Consumers from Genuine Theft"]. FBI.gov. 2010-05-11. Retrieved 2013-09-10.
# [http://www.ic3.gov/media/2013/130107.aspx "Internet Crime Complaint Center's (IC3) Scam Alerts January 7, 2013"]. ''IC3.gov''. 2013-01-07. Retrieved 2013-09-10.
# Loukas, G.; Oke, G. (September 2010) [August 2009]. [http://staffweb.cms.gre.ac.uk/~lg47/publications/LoukasOke-DoSSurveyComputerJournal.pdf "Protection Against Denial of Service Attacks: A Survey"] (PDF). ''[[The Computer Journal|Comput. J.]]'' '''53''' (7): 1020–1037. [[Digital object identifier|doi]]:[[doi:10.1093/comjnl/bxp078|10.1093/comjnl/bxp078]].
# Alqahtani, S.; Gamble, R. F. (1 January 2015). "DDoS Attacks in Service Clouds". ''2015 48th Hawaii International Conference on System Sciences (HICSS)'': 5331–5340. [[Digital object identifier|doi]]:[[doi:10.1109/HICSS.2015.627|10.1109/HICSS.2015.627]].
# Kousiouris, George (2014). [http://www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0004963006220628 "KEY COMPLETION INDICATORS:minimizing the effect of DoS attacks on elastic Cloud-based applications based on application-level markov chain checkpoints"]. ''CLOSER Conference''. Retrieved 2015-05-24.
# Patrikakis, C.; Masikos, M.; Zouraraki, O. (December 2004). [http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_7-4/dos_attacks.html "Distributed Denial of Service Attacks"]. ''The Internet Protocol Journal''. '''7''' (4): 13–35.
# Abante, Carl (March 2, 2013). [http://www.ecommercewisdom.com/relationship-firewalls-protection-ddos/ "Relationship between Firewalls and Protection against DDoS"]. ''Ecommerce Wisdom''. Retrieved 2013-05-24.
# Froutan, Paul (June 24, 2004). [http://www.computerworld.com/s/article/94014/How_to_defend_against_DDoS_attacks "How to defend against DDoS attacks"]. ''[[Computerworld]]''. Retrieved May 15, 2010.
# Suzen, Mehmet. [https://web.archive.org/web/20080910202908/http://mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf "Some IoS tips for Internet Service (Providers)"] (PDF). Archived from [http://mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf the original] (PDF) on 2008-09-10.
# [https://web.archive.org/web/20080921012859/http://research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf "DDoS Mitigation via Regional Cleaning Centers (Jan 2004)"] (PDF). ''SprintLabs.com''. Sprint ATL Research. Archived from [https://research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf the original] (PDF) on 2008-09-21. Retrieved 2011-12-02.
# Lunden, Ingrid (December 2, 2013). [http://techcrunch.com/2013/12/02/akamai-buys-ddos-prevention-specialist-prolexic-for-370m-to-ramp-up-security-offerings/ "Akamai Buys DDoS Prevention Specialist Prolexic For $370M To Ramp Up Security Offerings For Enterprises"]. TechCrunch. Retrieved September 23, 2014.
# Gallagher, Sean. [http://arstechnica.com/security/2014/02/biggest-ddos-ever-aimed-at-cloudflares-content-delivery-network/ "Biggest DDoS ever aimed at Cloudflare's content delivery network"]. ''Ars Technica''. Retrieved 18 May 2016.
# [http://www.level3.com/en/products/ddos-mitigation/ "Level 3 DDoS Mitigation"]. ''level3.com''. Retrieved 9 May 2016.
# [https://www.radware.com/Products/DefensePipe/ "Defensepipe"]. ''radware.com''. Retrieved 9 November 2015.
# [http://www.arbornetworks.com/arbor-partner/alliances/technology-alliances/clean-pipes-2-0 "Clean Pipes DDoS Protection and Mitigation from Arbor Networks & Cisco"]. ''ArborNetworks.com''. 8 August 2013.
# [http://www.business.att.com/content/productbrochures/ddos_prodbrief.pdf "AT&T Internet Protect Distributed Denial of Service Defense"] (PDF). ''ATT.com'' (Product brief). 16 October 2012.
# [https://f5.com/products/platforms/silverline/f5-silverline-ddos-protection/under-attack "Silverline DDoS Protection service"]. ''f5.com''. Retrieved 24 March 2015.
# [https://www.incapsula.com/infrastructure-ddos-protection-services.html "Infrastructure DDos Protection"]. ''incapsula.com''. Retrieved 10 June 2015.
# [http://www.neustar.biz/services/ddos-protection "DDoS Protection"]. ''Neustar.biz''. Retrieved 13 November 2014.
# [http://www.tatacommunications.com/news/release-view.asp?d=20110907-DDOS-protection "DDoS Protection with Network Agnostic Option"]. ''Tatacommunications.com''. 7 September 2011.
# [http://www.darkreading.com/attacks-breaches/verisign-rolls-out-ddos-monitoring-service/d/d-id/1131916 "VeriSign Rolls Out DDoS Monitoring Service"]. Darkreading.com. 11 September 2009. Retrieved 2 December 2011.
# [http://www.verizonenterprise.com/products/security/enforcement-protection "Security: Enforcement and Protection"]. Verizon.com. Retrieved 10 January 2015.
# [http://www.verizon.com/about/news/verizon-digital-media-services-launches-cloud-based-web-application-firewall-increases-defenses "Verizon Digital Media Services Launches Cloud-Based Web Application Firewall That Increases Defenses Against Cyberattacks"]. Verizon.com. Retrieved 10 January 2015.
# Shiels, Maggie (2009-06-26). [http://news.bbc.co.uk/1/hi/8120324.stm "Web slows after Jackson's death"]. ''BBC News''.
# [http://productforums.google.com/forum/?hl=en#!category-topic/websearch/unexpected-search-results/uFcXXixhiBw "We're Sorry. Automated Query error"]. ''Google Product Forums › Google Search Forum''. Google.com. October 20, 2009. Retrieved 2012-02-11.
# [http://news.bbc.co.uk/2/hi/business/6108502.stm "YouTube sued by sound-alike site"]. ''BBC News''. 2006-11-02.
# Bill Chappell (12 March 2014). [http://wnmufm.org/post/people-overload-website-hoping-help-search-missing-jet "People Overload Website, Hoping To Help Search For Missing Jet"]. NPR. Retrieved 4 February 2016.
# [http://www.caida.org/publications/animations/ "Backscatter Analysis (2001)"]. ''Animations'' (video). [[Cooperative Association for Internet Data Analysis]]. Retrieved December 11, 2013.
# [http://www.gpo.gov/fdsys/pkg/USCODE-2010-title18/html/USCODE-2010-title18-partI-chap47-sec1030.htm "United States Code: Title 18,1030. Fraud and related activity in connection with computers | Government Printing Office"]. www.gpo.gov. 2002-10-25. Retrieved 2014-01-15.
# [https://www.europol.europa.eu/content/international-action-against-dd4bc-cybercriminal-group "International Action Against DD4BC Cybercriminal Group"]. ''EUROPOL''. 12 January 2016.
# [http://www.legislation.gov.uk/ukpga/1990/18/section/3 "Computer Misuse Act 1990"]. ''legislation.gov.uk — The National Archives, of UK''. 10 January 2008.
# [http://www.huffingtonpost.com/2013/01/12/anonymous-ddos-petition-white-house_n_2463009.html "Anonymous DDoS Petition: Group Calls On White House To Recognize Distributed Denial Of Service As Protest."]. HuffingtonPost.com. 2013-01-12.
# [https://www.youtube.com/watch?v=59AlNnX_Ksg&feature=feedu "DDOS Attack: crime or virtual sit-in?"]. RT.com. YouTube.com. October 6, 2011.
[[Kategori:Hacking]]
[[Kategori:Ağ güvenliği]]
[[Kategori:Hacker terimleri]]