This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated.
What do you do? Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide.
The book, DDoS Attacks – Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show ...
... Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing,” RFC 2827, 2000. 47. S. Abdelsayed, D. Glimsholt, C. Leckie, S. Ryan, and S. Shami, “An efficient filter for denial-of-service bandwidth ...
... An efficient filter for denial-of-service bandwidth attacks. In: IEEE Global Telecommunications Conference (GLOBECOM 2003), vol. 3, pp. 1353–1357, December 2003 6. Snoeren, A.C.: Hash-based IP traceback. In: Proceedings of the ACM ...
... An efficient filter for denial-of-service bandwidth attacks. In: IEEE Global Telecommunications Conference (IEEE Cat. No. 03CH37489), GLOBECOM 2003. vol. 3, pp. 1353–1357. IEEE (2003) 2. Atzori, L., Iera, A., Morabito, G.: The internet ...
... DDoS Attack Detection Method Using Cluster Analysis. Expert Systems with Applications, 1659–1665 (2008) Abdelsayed, S., Glimsholt, D., Leckie, C., et al.: An efficient Filter for Denial-of Service Bandwidth Attacks. In: Proceedings of ...