000 05572cam a2200577Ii 4500
001 ocn930795667
003 OCoLC
005 20190328114813.0
006 m o d
007 cr cnu---unuuu
008 151202t20162016maua ob 000 0 eng d
040 _aOPELS
_beng
_erda
_epn
_cOPELS
_dN$T
_dIDEBK
_dYDXCP
_dUIU
_dN$T
_dOCLCF
_dEBLCP
_dCDX
_dMERUC
_dIDB
_dCDN
_dB24X7
_dCOO
_dD6H
_dLIV
_dOCLCQ
_dWRM
_dU3W
_dCEF
_dEZ9
_dOCLCQ
_dWYU
_dLOA
_dCUY
_dZCU
_dICG
_dCOCUF
_dVT2
_dDKC
019 _a928990254
_a933596660
_a938980026
_a945894560
_a957679814
_a957954051
_a958095821
_a958392378
_a959589934
_a962324060
_a962813784
_a987724884
020 _a0128053992
_q(electronic bk.)
020 _a9780128053997
_q(electronic bk.)
020 _z9780128053911
020 _a0128053917
020 _a9780128053911
035 _a(OCoLC)930795667
_z(OCoLC)928990254
_z(OCoLC)933596660
_z(OCoLC)938980026
_z(OCoLC)945894560
_z(OCoLC)957679814
_z(OCoLC)957954051
_z(OCoLC)958095821
_z(OCoLC)958392378
_z(OCoLC)959589934
_z(OCoLC)962324060
_z(OCoLC)962813784
_z(OCoLC)987724884
050 4 _aTK5109.59
_b.S65 2016eb
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_223
100 1 _aSoltanian, Mohammad Reza Khalifeh,
_eauthor.
245 1 0 _aTheoretical and experimental methods for defending against DDoS attacks /
_h[electronic resource]
_cMohammad Reza Khalifeh Soltanian, Iraj Sadegh Amiri.
264 1 _aWaltham, MA :
_bSyngress is an imprint of Elsevier,
_c2016.
264 4 _c�2016
300 _a1 online resource (viii, 62 pages) :
_billustrations.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 0 _aAdvanced topics in information security
520 _aDenial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim's IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks.
504 _aIncludes bibliographical references.
588 0 _aOnline resource; title from PDF title page (ScienceDirect, viewed December 2, 2015).
505 0 _aTitle page; Table of Contents; Copyright; List of figures; List of tables; Preface; Chapter 1: Introduction; Abstract; 1.1. DDoS attacks; 1.2. Motivation; 1.3. Objective; 1.4. Organization; Chapter 2: Related Works; Abstract; 2.1. General overview and definitions; 2.2. Client puzzle theory; 2.3. CPU-bound puzzles; 2.4. Summary of CPU-bound puzzles; 2.5. Memory-bound puzzles; 2.6. Summary of memory-bound puzzles; 2.7. Comparison of existing client puzzles schemes; 2.8. Collaboration of detection over multiple networks; Chapter 3: Problem Solving, Investigating Ideas, and Solutions; Abstract.
505 8 _a3.1. MikroTik routers3.2. Multirouter traffic grapher (MRTG); 3.3. Birthday attack and birthday paradox; 3.4. Legal and illegal requests; 3.5. Traffic models; 3.6. Assumptions and considerations; 3.7. Probability of concurrency request to a website; 3.8. Detection and prevention; Chapter 4: Results and Discussions; Abstract; 4.1. Time investigation in attack detection; 4.2. False-positive and false-negative error; 4.3. Measuring the performance metrics; 4.4. Trade off; 4.5. Summary; Chapter 5: Conclusions and Recommendations; Abstract; 5.1. Conclusions; 5.2. Recommendations; References.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aDenial of service attacks.
650 7 _aCOMPUTERS
_xInternet
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xNetworking
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00872341
650 7 _aDenial of service attacks.
_2fast
_0(OCoLC)fst01749399
655 4 _aElectronic books.
655 7 _aElectronic books.
_2lcgft
700 1 _aAmiri, Iraj Sadegh,
_d1977-
_eauthor.
776 0 8 _iPrint version:
_aAmiri, I.S.
_tTheoretical and Experimental Methods for Defending Against DDoS Attacks.
_d: Elsevier Science, �2015
856 4 0 _3ScienceDirect
_uhttp://www.sciencedirect.com/science/book/9780128053911
999 _c247239
_d247239