TFN2KTribe Flood Network 2000 (Network DOS Attack)
References in periodicals archive ?
Tribal Flood Network and TFN2K, Stacheldraht) combine two modes, using the Internet to install attack software on multiple unwitting intermediary systems ("zombies"), from which simultaneous DoS attacks can be launched on target systems without requiring penetrations.
Both spoof IP addresses to make it difficult to detect the origin of the attack, and TFN2K can forge packets that appear to come from legitimate neighboring machines.
The NIPC has released a program to help companies detect TFN2K and Trinoo so that they can be removed; however, the program only works on Solaris-based systems.