| •The attacks that we look at today are in one of
three categories and have the following goals: |
|||
| •Prevent another user from using a network
connection |
|||
| •Disable a host or service |
|||
| •Monitor traffic |
|||
| •The reasons for these goals vary: |
|||
| •Usually the prevention of network, host, or
service usability is a result of some revenge. |
|||
| •Monitoring traffic usually has two eventual
goals: |
|||
| •New compromised accounts from which attacks can
be staged |
|||
| •Espionage of some type, resulting in
embarrassment or blackmail |
|||