Many attacks were theoretical…
SYN packet flooding
Mail flooding and similar application overflows
TCP hijacking
Hadn’t seen a worm in years
Unix viruses were research topics
Attacks on the TCP/IP stacks
Packet amplification
Previous slide
Next slide
Back to first slide
View graphic version