ebooks and download videos Search All  Title  Author 
Home / Nonfiction / Computers / Security

Theoretical and Experimental Methods for Defending Against DDoS Attacks

| £58.28 | €65.55 | Ca$94.56 | Au$93.32
by I. S. Amiri & M. R. K. Soltanian
What is this?DRM-EPUB by download  |  $69.95
What is this?DRM-PDF by download  |  $69.95
add to wish list
Theoretical and Experimental Methods for Defending Against DDoS Attacks by I. S. Amiri & M. R. K. Soltanian

Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim's IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks.

  • A comprehensive study on the basics of network security
  • Provides a wide revision on client puzzle theory
  • An experimental model to mitigate distributed denial of service (DDoS) attacks

To view this DRM protected ebook on your desktop or laptop you will need to have Adobe Digital Editions installed. It is a free software. We also strongly recommend that you sign up for an AdobeID at the Adobe website. For more details please see FAQ 1&2. To view this ebook on an iPhone, iPad or Android mobile device you will need the Adobe Digital Editions app, or BlueFire Reader or Txtr app. These are free, too. For more details see this article.

SHARE  Share by Email  Share on Facebook  Share on Twitter  Share on Linked In  Share on Delicious
or call in the US toll free 1-888-866-9150 product ID: 799773

Ebook Details
Pages: 74
Size: 9.2 MB
Publisher: Syngress
Date published:   2015
ISBN: 2370007192786 (DRM-EPUB)
9780128053997 (DRM-PDF)

DRM Settings
Read Aloud:  not allowed

This product is listed in the following category:

Nonfiction > Computers > Security

These authors have products in the following categories:

Nonfiction > Computers > Security
Nonfiction > Computers > Networking
Nonfiction > Computers > Networking > Security

If you find anything wrong with this product listing, perhaps the description is wrong, the author is incorrect, or it is listed in the wrong category, then please contact us. We will promptly address your feedback.

Submit 5 page SummaryWhat is this?

© 2016