Glossary
- ACK: A TCP acknowledgment packet.
- Backlog queue: Server-side queue used during incomplete TCP connection setup.
- BCP 38: Best Current Practice for blocking spoofed source addresses with ingress filtering.
- Bot: Malware that can receive commands from a human operator or command server.
- Botnet: A collection of bots under coordinated control.
- Buffer overflow: Writing beyond the memory allocated for a buffer.
- Cache poisoning: Inserting false records into a DNS cache.
- C&C (Command and Control): Infrastructure used to manage bots or malware.
- Cross-Site Scripting (XSS): Injection of active script into a browser context.
- Daemon: A continuously running service process that waits for requests.
- DDoS: Distributed denial of service.
- DNS: Domain Name System.
- Half-open connection: A TCP connection for which setup has started but not completed.
- IDS / IPS: Intrusion Detection System / Intrusion Prevention System.
- Ingress filtering: Filtering traffic entering or leaving a network to block invalid source addresses.
- IP spoofing: Forging the source IP address in packets.
- Pharming: Redirecting users to malicious destinations through name-resolution manipulation.
- Phishing: Fraudulent attempt to steal information by deception.
- Rainbow table: Precomputed structure for reversing password hashes more efficiently.
- Spear phishing: Targeted phishing aimed at a particular person or group.
- SYN flood: DoS attack based on exhausting server resources during TCP setup.
- TTL: Time To Live field used to limit how far a packet can travel.
- Worm: Self-propagating malware that spreads from host to host.