Library Logo

Theoretical and experimental methods for defending against DDoS attacks / (Record no. 247239)

000 -LEADER
fixed length control field 05572cam a2200577Ii 4500
001 - CONTROL NUMBER
control field ocn930795667
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190328114813.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151202t20162016maua ob 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency OPELS
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency OPELS
Modifying agency N$T
-- IDEBK
-- YDXCP
-- UIU
-- N$T
-- OCLCF
-- EBLCP
-- CDX
-- MERUC
-- IDB
-- CDN
-- B24X7
-- COO
-- D6H
-- LIV
-- OCLCQ
-- WRM
-- U3W
-- CEF
-- EZ9
-- OCLCQ
-- WYU
-- LOA
-- CUY
-- ZCU
-- ICG
-- COCUF
-- VT2
-- DKC
019 ## -
-- 928990254
-- 933596660
-- 938980026
-- 945894560
-- 957679814
-- 957954051
-- 958095821
-- 958392378
-- 959589934
-- 962324060
-- 962813784
-- 987724884
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0128053992
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128053997
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780128053911
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0128053917
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128053911
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)930795667
Canceled/invalid control number (OCoLC)928990254
-- (OCoLC)933596660
-- (OCoLC)938980026
-- (OCoLC)945894560
-- (OCoLC)957679814
-- (OCoLC)957954051
-- (OCoLC)958095821
-- (OCoLC)958392378
-- (OCoLC)959589934
-- (OCoLC)962324060
-- (OCoLC)962813784
-- (OCoLC)987724884
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5109.59
Item number .S65 2016eb
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 060040
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 043050
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Soltanian, Mohammad Reza Khalifeh,
Relator term author.
245 10 - TITLE STATEMENT
Title Theoretical and experimental methods for defending against DDoS attacks /
Medium [electronic resource]
Statement of responsibility, etc. Mohammad Reza Khalifeh Soltanian, Iraj Sadegh Amiri.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Waltham, MA :
Name of producer, publisher, distributor, manufacturer Syngress is an imprint of Elsevier,
Date of production, publication, distribution, manufacture, or copyright notice 2016.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice �2016
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (viii, 62 pages) :
Other physical details illustrations.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
490 0# - SERIES STATEMENT
Series statement Advanced topics in information security
520 ## - SUMMARY, ETC.
Summary, etc. Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim's IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references.
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Online resource; title from PDF title page (ScienceDirect, viewed December 2, 2015).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Title page; Table of Contents; Copyright; List of figures; List of tables; Preface; Chapter 1: Introduction; Abstract; 1.1. DDoS attacks; 1.2. Motivation; 1.3. Objective; 1.4. Organization; Chapter 2: Related Works; Abstract; 2.1. General overview and definitions; 2.2. Client puzzle theory; 2.3. CPU-bound puzzles; 2.4. Summary of CPU-bound puzzles; 2.5. Memory-bound puzzles; 2.6. Summary of memory-bound puzzles; 2.7. Comparison of existing client puzzles schemes; 2.8. Collaboration of detection over multiple networks; Chapter 3: Problem Solving, Investigating Ideas, and Solutions; Abstract.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3.1. MikroTik routers3.2. Multirouter traffic grapher (MRTG); 3.3. Birthday attack and birthday paradox; 3.4. Legal and illegal requests; 3.5. Traffic models; 3.6. Assumptions and considerations; 3.7. Probability of concurrency request to a website; 3.8. Detection and prevention; Chapter 4: Results and Discussions; Abstract; 4.1. Time investigation in attack detection; 4.2. False-positive and false-negative error; 4.3. Measuring the performance metrics; 4.4. Trade off; 4.5. Summary; Chapter 5: Conclusions and Recommendations; Abstract; 5.1. Conclusions; 5.2. Recommendations; References.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Denial of service attacks.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Internet
-- Security.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Networking
-- Security.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Security
-- General.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
Source of heading or term fast
Authority record control number (OCoLC)fst00872341
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Denial of service attacks.
Source of heading or term fast
Authority record control number (OCoLC)fst01749399
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term lcgft
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Amiri, Iraj Sadegh,
Dates associated with a name 1977-
Relator term author.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Amiri, I.S.
Title Theoretical and Experimental Methods for Defending Against DDoS Attacks.
Place, publisher, and date of publication : Elsevier Science, �2015
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified ScienceDirect
Uniform Resource Identifier http://www.sciencedirect.com/science/book/9780128053911

No items available.

Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login