17

Denial-of-service (DoS) Detection and Source Tracing
Persistent Denial-of-Service Attacks

    TCP SYN attacks

    ICMP flooding

    bandwidth saturation

    concentrated source ``smurf'' attacks