𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Theoretical and Experimental Methods for Defending Against DDOS Attacks

✍ Scribed by Amiri, Iraj Sadegh; Soltanian, Mohammad Reza Khalifeh


Publisher
Syngress is an imprint of Elsevier
Year
2016
Tongue
English
Leaves
65
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim’s IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks.

  • A comprehensive study on the basics of network security
  • Provides a wide revision on client puzzle theory
  • An experimental model to mitigate distributed denial of service (DDoS) attacks

✦ Table of Contents


Content:
Front matter,Copyright,List of figures,List of tables,PrefaceEntitled to full textChapter 1 - Introduction, Pages 1-5
Chapter 2 - Related Works, Pages 7-31
Chapter 3 - Problem Solving, Investigating Ideas, and Solutions, Pages 33-45
Chapter 4 - Results and Discussions, Pages 47-56
Chapter 5 - Conclusions and Recommendations, Pages 57-58
References, Pages 59-62


πŸ“œ SIMILAR VOLUMES


Defence Against Bioterrorism: Methods fo
✍ Vladan Radosavljevic; Ines Banjari; Goran Belojevic πŸ“‚ Library πŸ“… 2018 πŸ› Springer 🌐 English

This volume is based on a multidisciplinary approach towards biological and chemical threats that can, and have been previously used in bioterrorism attacks around the globe. Current knowledge and evidence-based principles from the fields of synthetic biology, microbiology, plant biology, chemistry,

Defending eBusinesses and Hosting Servic
πŸ“‚ Library 🌐 English

A netZentry Technology White Paper. Авторство ΠΈ Π²Ρ‹Ρ…ΠΎΠ΄Π½Ρ‹Π΅ Π΄Π°Π½Π½Ρ‹Π΅ Π½Π΅ ΠΏΡ€ΠΈΠ²Π΅Π΄Π΅Π½Ρ‹.<div class="bb-sep"></div>Distributed Denial-Of-Service (DDoS) Attacks.<br/>Approaches to DDoS Defense.<br/>Attack Detection.<br/>Attack Tracking.<br/>Attack Mitigation.<br/>Defense Management.<br/>CleanTraffic Deployment.<

Unbounded Dependency Constructions: Theo
✍ Rui P. Chaves, Michael T. Putnam πŸ“‚ Library πŸ“… 2020 πŸ› Oxford University Press 🌐 English

This book is about one of the most intriguing features of human communication systems: the fact that words that go together in meaning can occur arbitrarily far away from each other. In the sentence <em>This is technology that most people think about, but rarely consider the implications of</em>, th