Internet Infrastructure Attacks
Router attacks
- intruders understand router administration
- modifying router configurations
Root name server attacks
- not exploiting any new vulnerabilities
- targeting the infrastructure
Internet service attacks
- FTP archives
- Trojan Horse source (CA-94:07 and CA-94:14)