Cargando…

Theoretical and experimental methods for defending against DDoS attacks /

Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a la...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Soltanian, Mohammad Reza Khalifeh (Autor), Amiri, Iraj Sadegh, 1977- (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress is an imprint of Elsevier, [2016]
Colección:Advanced topics in information security
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 SCIDIR_ocn930795667
003 OCoLC
005 20231120112039.0
006 m o d
007 cr cnu---unuuu
008 151202t20162016maua ob 000 0 eng d
040 |a OPELS  |b eng  |e rda  |e pn  |c OPELS  |d N$T  |d IDEBK  |d YDXCP  |d UIU  |d N$T  |d OCLCF  |d EBLCP  |d CDX  |d MERUC  |d IDB  |d CDN  |d B24X7  |d COO  |d D6H  |d LIV  |d OCLCQ  |d WRM  |d U3W  |d CEF  |d EZ9  |d OCLCQ  |d WYU  |d LOA  |d CUY  |d ZCU  |d ICG  |d COCUF  |d VT2  |d DKC  |d OCLCQ  |d DCT  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 928990254  |a 933596660  |a 938980026  |a 945894560  |a 957679814  |a 957954051  |a 958095821  |a 958392378  |a 959589934  |a 962324060  |a 962813784  |a 987724884 
020 |a 0128053992  |q (electronic bk.) 
020 |a 9780128053997  |q (electronic bk.) 
020 |a 0128053917 
020 |a 9780128053911 
020 |z 9780128053911 
035 |a (OCoLC)930795667  |z (OCoLC)928990254  |z (OCoLC)933596660  |z (OCoLC)938980026  |z (OCoLC)945894560  |z (OCoLC)957679814  |z (OCoLC)957954051  |z (OCoLC)958095821  |z (OCoLC)958392378  |z (OCoLC)959589934  |z (OCoLC)962324060  |z (OCoLC)962813784  |z (OCoLC)987724884 
050 4 |a TK5109.59  |b .S65 2016eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
100 1 |a Soltanian, Mohammad Reza Khalifeh,  |e author. 
245 1 0 |a Theoretical and experimental methods for defending against DDoS attacks /  |c Mohammad Reza Khalifeh Soltanian, Iraj Sadegh Amiri. 
264 1 |a Waltham, MA :  |b Syngress is an imprint of Elsevier,  |c [2016] 
264 4 |c �2016 
300 |a 1 online resource (viii, 62 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 0 |a Advanced topics in information security 
520 |a Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim's IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks. 
504 |a Includes bibliographical references. 
588 0 |a Online resource; title from PDF title page (ScienceDirect, viewed December 2, 2015). 
505 0 |a Title page; Table of Contents; Copyright; List of figures; List of tables; Preface; Chapter 1: Introduction; Abstract; 1.1. DDoS attacks; 1.2. Motivation; 1.3. Objective; 1.4. Organization; Chapter 2: Related Works; Abstract; 2.1. General overview and definitions; 2.2. Client puzzle theory; 2.3. CPU-bound puzzles; 2.4. Summary of CPU-bound puzzles; 2.5. Memory-bound puzzles; 2.6. Summary of memory-bound puzzles; 2.7. Comparison of existing client puzzles schemes; 2.8. Collaboration of detection over multiple networks; Chapter 3: Problem Solving, Investigating Ideas, and Solutions; Abstract. 
505 8 |a 3.1. MikroTik routers3.2. Multirouter traffic grapher (MRTG); 3.3. Birthday attack and birthday paradox; 3.4. Legal and illegal requests; 3.5. Traffic models; 3.6. Assumptions and considerations; 3.7. Probability of concurrency request to a website; 3.8. Detection and prevention; Chapter 4: Results and Discussions; Abstract; 4.1. Time investigation in attack detection; 4.2. False-positive and false-negative error; 4.3. Measuring the performance metrics; 4.4. Trade off; 4.5. Summary; Chapter 5: Conclusions and Recommendations; Abstract; 5.1. Conclusions; 5.2. Recommendations; References. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Denial of service attacks. 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 6 |a Attaques par saturation.  |0 (CaQQLa)000276062 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Denial of service attacks  |2 fast  |0 (OCoLC)fst01749399 
700 1 |a Amiri, Iraj Sadegh,  |d 1977-  |e author. 
776 0 8 |i Print version:  |a Amiri, I.S.  |t Theoretical and Experimental Methods for Defending Against DDoS Attacks.  |d : Elsevier Science, �2015 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780128053911  |z Texto completo