•The attacks that we look at today are in one of
three categories and have the following goals: |
|||
•Prevent another user from using a network
connection |
|||
•Disable a host or service |
|||
•Monitor traffic |
|||
•The reasons for these goals vary: |
|||
•Usually the prevention of network, host, or
service usability is a result of some revenge. |
|||
•Monitoring traffic usually has two eventual
goals: |
|||
•New compromised accounts from which attacks can
be staged |
|||
•Espionage of some type, resulting in
embarrassment or blackmail |