Saturday, July 29, 2006
Phishing, Pharming and now Phlooding
"What’s it with all these companies that coin new terms to describe Network security problems. One thing that goes unnoticed is that most of them have a fixation for the letter "P" to name the latest network attacks.
Phlooding is described as a group of simultaneous but geographically distributed attacks that targets a business's authentication or login in a wireless network with the goal of overloading its central authentication server. These sorts of attacks are aimed at organizations, which operate from multiple locations but are largely dependant on a single server.
When many such multiple logins are attempted simultaneously, it could cause a flood of login requests severely slowing down of an otherwise fast server. It may also result in blocking Email or Database access, which means it, may end up in a denial of service sort of a situation.
AirMagnet a wireless security company is introducing wireless intrusion prevention system that includes wireless event correlation and detection methods designed to identify clusters of attacks that indicate phlooding and similar exploit.
So what’s the difference between phishing, pharming and phlooding?
Who comes up with this stuff?