Distributed Denial of Service Attacks
-10%
portes grátis
Distributed Denial of Service Attacks
Real-world Detection and Mitigation
OEzcelik, Ilker; Brooks, Richard
Taylor & Francis Ltd
08/2020
398
Mole
Inglês
9781138626812
15 a 20 dias
725
Descrição não disponível.
Table of Contents
List of Figures
List of Tables
Foreword
About the Authors
Acknowledgements
Preface
Contributors
Introduction
What is DDoS?
History and Motivation
Legal Considerations
DDoS Research: Traffic
DDoS Research: Testing
DDoS Research: Evaluation
Attack Detection
Deceiving DDoS Detection
Detecting DDoS Attack Traffic
Attack Mitigation
Security and DDoS in SDN: Opportunities and Challenges
Denial of Service Attack in Control Systems
Denial of Service Attack on Phasor Measurement Unit
DDoS Lab
Conclusion
Appendix
Bibliography
Index
List of Figures
List of Tables
Foreword
About the Authors
Acknowledgements
Preface
Contributors
Introduction
What is DDoS?
History and Motivation
Legal Considerations
DDoS Research: Traffic
DDoS Research: Testing
DDoS Research: Evaluation
Attack Detection
Deceiving DDoS Detection
Detecting DDoS Attack Traffic
Attack Mitigation
Security and DDoS in SDN: Opportunities and Challenges
Denial of Service Attack in Control Systems
Denial of Service Attack on Phasor Measurement Unit
DDoS Lab
Conclusion
Appendix
Bibliography
Index
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Attack Traffic;network security;DoS Attack;cyberwar;Background Traffic;software defined networks;Source IP Address;cyber attack;Spoofing Attack;performance analysis;Operational Network Data;network design;Mitigation System;Detection Approaches;Cps;DoS;SDN Controller;PMU Measurement;Destination IP Address;Attack Detection;Content Delivery Networks;ICMP;Network Traffic;UDP Packet;Normalized Entropy;VPN Tunnel;Tcp;Launch DDoS Attack;Python API;CSV Format;PDC
Table of Contents
List of Figures
List of Tables
Foreword
About the Authors
Acknowledgements
Preface
Contributors
Introduction
What is DDoS?
History and Motivation
Legal Considerations
DDoS Research: Traffic
DDoS Research: Testing
DDoS Research: Evaluation
Attack Detection
Deceiving DDoS Detection
Detecting DDoS Attack Traffic
Attack Mitigation
Security and DDoS in SDN: Opportunities and Challenges
Denial of Service Attack in Control Systems
Denial of Service Attack on Phasor Measurement Unit
DDoS Lab
Conclusion
Appendix
Bibliography
Index
List of Figures
List of Tables
Foreword
About the Authors
Acknowledgements
Preface
Contributors
Introduction
What is DDoS?
History and Motivation
Legal Considerations
DDoS Research: Traffic
DDoS Research: Testing
DDoS Research: Evaluation
Attack Detection
Deceiving DDoS Detection
Detecting DDoS Attack Traffic
Attack Mitigation
Security and DDoS in SDN: Opportunities and Challenges
Denial of Service Attack in Control Systems
Denial of Service Attack on Phasor Measurement Unit
DDoS Lab
Conclusion
Appendix
Bibliography
Index
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Attack Traffic;network security;DoS Attack;cyberwar;Background Traffic;software defined networks;Source IP Address;cyber attack;Spoofing Attack;performance analysis;Operational Network Data;network design;Mitigation System;Detection Approaches;Cps;DoS;SDN Controller;PMU Measurement;Destination IP Address;Attack Detection;Content Delivery Networks;ICMP;Network Traffic;UDP Packet;Normalized Entropy;VPN Tunnel;Tcp;Launch DDoS Attack;Python API;CSV Format;PDC