000 | 05572cam a2200577Ii 4500 | ||
---|---|---|---|
001 | ocn930795667 | ||
003 | OCoLC | ||
005 | 20190328114813.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 151202t20162016maua ob 000 0 eng d | ||
040 |
_aOPELS _beng _erda _epn _cOPELS _dN$T _dIDEBK _dYDXCP _dUIU _dN$T _dOCLCF _dEBLCP _dCDX _dMERUC _dIDB _dCDN _dB24X7 _dCOO _dD6H _dLIV _dOCLCQ _dWRM _dU3W _dCEF _dEZ9 _dOCLCQ _dWYU _dLOA _dCUY _dZCU _dICG _dCOCUF _dVT2 _dDKC |
||
019 |
_a928990254 _a933596660 _a938980026 _a945894560 _a957679814 _a957954051 _a958095821 _a958392378 _a959589934 _a962324060 _a962813784 _a987724884 |
||
020 |
_a0128053992 _q(electronic bk.) |
||
020 |
_a9780128053997 _q(electronic bk.) |
||
020 | _z9780128053911 | ||
020 | _a0128053917 | ||
020 | _a9780128053911 | ||
035 |
_a(OCoLC)930795667 _z(OCoLC)928990254 _z(OCoLC)933596660 _z(OCoLC)938980026 _z(OCoLC)945894560 _z(OCoLC)957679814 _z(OCoLC)957954051 _z(OCoLC)958095821 _z(OCoLC)958392378 _z(OCoLC)959589934 _z(OCoLC)962324060 _z(OCoLC)962813784 _z(OCoLC)987724884 |
||
050 | 4 |
_aTK5109.59 _b.S65 2016eb |
|
072 | 7 |
_aCOM _x060040 _2bisacsh |
|
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aSoltanian, Mohammad Reza Khalifeh, _eauthor. |
|
245 | 1 | 0 |
_aTheoretical and experimental methods for defending against DDoS attacks / _h[electronic resource] _cMohammad Reza Khalifeh Soltanian, Iraj Sadegh Amiri. |
264 | 1 |
_aWaltham, MA : _bSyngress is an imprint of Elsevier, _c2016. |
|
264 | 4 | _c�2016 | |
300 |
_a1 online resource (viii, 62 pages) : _billustrations. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 0 | _aAdvanced topics in information security | |
520 | _aDenial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim's IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks. | ||
504 | _aIncludes bibliographical references. | ||
588 | 0 | _aOnline resource; title from PDF title page (ScienceDirect, viewed December 2, 2015). | |
505 | 0 | _aTitle page; Table of Contents; Copyright; List of figures; List of tables; Preface; Chapter 1: Introduction; Abstract; 1.1. DDoS attacks; 1.2. Motivation; 1.3. Objective; 1.4. Organization; Chapter 2: Related Works; Abstract; 2.1. General overview and definitions; 2.2. Client puzzle theory; 2.3. CPU-bound puzzles; 2.4. Summary of CPU-bound puzzles; 2.5. Memory-bound puzzles; 2.6. Summary of memory-bound puzzles; 2.7. Comparison of existing client puzzles schemes; 2.8. Collaboration of detection over multiple networks; Chapter 3: Problem Solving, Investigating Ideas, and Solutions; Abstract. | |
505 | 8 | _a3.1. MikroTik routers3.2. Multirouter traffic grapher (MRTG); 3.3. Birthday attack and birthday paradox; 3.4. Legal and illegal requests; 3.5. Traffic models; 3.6. Assumptions and considerations; 3.7. Probability of concurrency request to a website; 3.8. Detection and prevention; Chapter 4: Results and Discussions; Abstract; 4.1. Time investigation in attack detection; 4.2. False-positive and false-negative error; 4.3. Measuring the performance metrics; 4.4. Trade off; 4.5. Summary; Chapter 5: Conclusions and Recommendations; Abstract; 5.1. Conclusions; 5.2. Recommendations; References. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aDenial of service attacks. | |
650 | 7 |
_aCOMPUTERS _xInternet _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xNetworking _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh |
|
650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 |
|
650 | 7 |
_aDenial of service attacks. _2fast _0(OCoLC)fst01749399 |
|
655 | 4 | _aElectronic books. | |
655 | 7 |
_aElectronic books. _2lcgft |
|
700 | 1 |
_aAmiri, Iraj Sadegh, _d1977- _eauthor. |
|
776 | 0 | 8 |
_iPrint version: _aAmiri, I.S. _tTheoretical and Experimental Methods for Defending Against DDoS Attacks. _d: Elsevier Science, �2015 |
856 | 4 | 0 |
_3ScienceDirect _uhttp://www.sciencedirect.com/science/book/9780128053911 |
999 |
_c247239 _d247239 |