17
Denial-of-service (DoS) Detection and Source Tracing
Persistent Denial-of-Service Attacks
TCP SYN attacks
ICMP flooding
bandwidth saturation
concentrated source ``smurf'' attacks