DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance
2016 | ISBN-10: 1498729649 | 312 Pages | PDF | 10 MB
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with the goal of tolerating the attack. It introduces types and characteristics of DDoS attacks, reasons why such attacks are often successful, what aspects of the network infrastructure are usual targets, and methods used to launch attacks.
The book elaborates upon the emerging botnet technology, current trends in the evolution and use of botnet technology, its role in facilitating the launching of DDoS attacks, and challenges in countering the role of botnets in the proliferation of DDoS attacks. It introduces statistical and machine learning methods applied in the detection and prevention of DDoS attacks in order to provide a clear understanding of the state of the art. It presents DDoS reaction and tolerance mechanisms with a view to studying their effectiveness in protecting network resources without compromising the quality of services.
To practically understand how attackers plan and mount DDoS attacks, the authors discuss the development of a testbed that can be used to perform experiments such as attack launching, monitoring of network traffic, and detection of attacks, as well as for testing strategies for prevention, reaction, and mitigation. Finally, the authors address current issues and challenges that need to be overcome to provide even better defense against DDoS attacks.
Network and Data Security for Non-Engineers
Sensitive Security Information, Certified? (SSI) Body of Knowledge
Practical Cloud Security: A Cross-Industry View
Enterprise Level Security: Securing Information Systems in an Uncertain World
Ransomware: Defending Against Digital Extortion
Web Application Vulnerabilities: Detect, Exploit, Prevent
Monitoring, Security, and Rescue Techniques in Multiagent Systems
Physical-Layer Security for Cooperative Relay Networks
Geek Squad Manuals
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Hacking: The Beginners Guide to Master The(2592)
Learning Network Forensics(2251)
How to Disappear From The Internet Complet(2166)
Ethical Hacking : Learn Easy: Learn Ethica(2024)
Tor And The Dark Net: Learn To Avoid NSA S(1835)
The Art of Memory Forensics: Detecting Mal(1686)
Digital Habits: 5 Simple Tips for Everyday(1631)
Make my PC safer and faster in an hour(1615)
Cyber Security: for You(1591)
Computer Security Fundamentals, 3rd Editi(1459)
Essential Cyber Security Handbook(1366)
Practical Forensic Imaging: Securing Digit(1344)
Mastering Modern Web Penetration Testing(1314)