Theoretical and experimental methods for defending against DDoS attacks / (Record no. 247239)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05572cam a2200577Ii 4500 |
001 - CONTROL NUMBER | |
control field | ocn930795667 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20190328114813.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu---unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 151202t20162016maua ob 000 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | OPELS |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | OPELS |
Modifying agency | N$T |
-- | IDEBK |
-- | YDXCP |
-- | UIU |
-- | N$T |
-- | OCLCF |
-- | EBLCP |
-- | CDX |
-- | MERUC |
-- | IDB |
-- | CDN |
-- | B24X7 |
-- | COO |
-- | D6H |
-- | LIV |
-- | OCLCQ |
-- | WRM |
-- | U3W |
-- | CEF |
-- | EZ9 |
-- | OCLCQ |
-- | WYU |
-- | LOA |
-- | CUY |
-- | ZCU |
-- | ICG |
-- | COCUF |
-- | VT2 |
-- | DKC |
019 ## - | |
-- | 928990254 |
-- | 933596660 |
-- | 938980026 |
-- | 945894560 |
-- | 957679814 |
-- | 957954051 |
-- | 958095821 |
-- | 958392378 |
-- | 959589934 |
-- | 962324060 |
-- | 962813784 |
-- | 987724884 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0128053992 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780128053997 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9780128053911 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0128053917 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780128053911 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)930795667 |
Canceled/invalid control number | (OCoLC)928990254 |
-- | (OCoLC)933596660 |
-- | (OCoLC)938980026 |
-- | (OCoLC)945894560 |
-- | (OCoLC)957679814 |
-- | (OCoLC)957954051 |
-- | (OCoLC)958095821 |
-- | (OCoLC)958392378 |
-- | (OCoLC)959589934 |
-- | (OCoLC)962324060 |
-- | (OCoLC)962813784 |
-- | (OCoLC)987724884 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5109.59 |
Item number | .S65 2016eb |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 060040 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 043050 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 053000 |
Source | bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Soltanian, Mohammad Reza Khalifeh, |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Theoretical and experimental methods for defending against DDoS attacks / |
Medium | [electronic resource] |
Statement of responsibility, etc. | Mohammad Reza Khalifeh Soltanian, Iraj Sadegh Amiri. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Waltham, MA : |
Name of producer, publisher, distributor, manufacturer | Syngress is an imprint of Elsevier, |
Date of production, publication, distribution, manufacture, or copyright notice | 2016. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Date of production, publication, distribution, manufacture, or copyright notice | �2016 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (viii, 62 pages) : |
Other physical details | illustrations. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
490 0# - SERIES STATEMENT | |
Series statement | Advanced topics in information security |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim's IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references. |
588 0# - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Online resource; title from PDF title page (ScienceDirect, viewed December 2, 2015). |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Title page; Table of Contents; Copyright; List of figures; List of tables; Preface; Chapter 1: Introduction; Abstract; 1.1. DDoS attacks; 1.2. Motivation; 1.3. Objective; 1.4. Organization; Chapter 2: Related Works; Abstract; 2.1. General overview and definitions; 2.2. Client puzzle theory; 2.3. CPU-bound puzzles; 2.4. Summary of CPU-bound puzzles; 2.5. Memory-bound puzzles; 2.6. Summary of memory-bound puzzles; 2.7. Comparison of existing client puzzles schemes; 2.8. Collaboration of detection over multiple networks; Chapter 3: Problem Solving, Investigating Ideas, and Solutions; Abstract. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 3.1. MikroTik routers3.2. Multirouter traffic grapher (MRTG); 3.3. Birthday attack and birthday paradox; 3.4. Legal and illegal requests; 3.5. Traffic models; 3.6. Assumptions and considerations; 3.7. Probability of concurrency request to a website; 3.8. Detection and prevention; Chapter 4: Results and Discussions; Abstract; 4.1. Time investigation in attack detection; 4.2. False-positive and false-negative error; 4.3. Measuring the performance metrics; 4.4. Trade off; 4.5. Summary; Chapter 5: Conclusions and Recommendations; Abstract; 5.1. Conclusions; 5.2. Recommendations; References. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Denial of service attacks. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | COMPUTERS |
General subdivision | Internet |
-- | Security. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | COMPUTERS |
General subdivision | Networking |
-- | Security. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | COMPUTERS |
General subdivision | Security |
-- | General. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
Source of heading or term | fast |
Authority record control number | (OCoLC)fst00872341 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Denial of service attacks. |
Source of heading or term | fast |
Authority record control number | (OCoLC)fst01749399 |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
655 #7 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
Source of term | lcgft |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Amiri, Iraj Sadegh, |
Dates associated with a name | 1977- |
Relator term | author. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | Amiri, I.S. |
Title | Theoretical and Experimental Methods for Defending Against DDoS Attacks. |
Place, publisher, and date of publication | : Elsevier Science, �2015 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | ScienceDirect |
Uniform Resource Identifier | http://www.sciencedirect.com/science/book/9780128053911 |
No items available.