Skip to main content

2014 | Buch

Distributed Denial of Service Attack and Defense

insite
SUCHEN

Über dieses Buch

This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial field along with background context and survey material. The book also supplies an overview of DDoS attack issues, DDoS attack detection methods, DDoS attack source traceback, and details on how hackers organize DDoS attacks. The author concludes with future directions of the field, including the impact of DDoS attacks on cloud computing and cloud technology. The concise yet comprehensive nature of this brief makes it an ideal reference for researchers and professionals studying DDoS attacks. It is also a useful resource for graduate students interested in cyberterrorism and networking.

Inhaltsverzeichnis

Frontmatter
Chapter 1. An Overview of DDoS Attacks
Abstract
In this chapter, we firstly review the short history of denial of service (DoS) and distributed denial of service (DDoS) attacks. We further explore the reasons why the current cyberspace is a heaven for cyber criminals, such as DDoS attackers. We present the challenges of the DDoS related research fields from various aspects, and discuss the possible research methods and strategies to serve the challenges.
Shui Yu
Chapter 2. Malicious Networks for DDoS Attacks
Abstract
In this chapter, we explore botnet, the engine of DDoS attacks, in cyberspace. We focus on two recent techniques that hackers are using to sustain their malicious networks, fast fluxing and domain fluxing. We present the mechanisms of these two techniques and also survey the detection and anti-attack methods that have been proposed against them in literature.
Shui Yu
Chapter 3. DDoS Attack Detection
Abstract
In this chapter, we study on detection methods on DDoS attacks, which covers feature based detection methods, network traffic based detection methods, and detections against legitimate network event mimicking attacks. Each detection method is mathematically modelled for readers for possible further work in the fields.
Shui Yu
Chapter 4. Attack Source Traceback
Abstract
In this chapter, we investigate the attack source traceback in DDoS defence. We summarize the three major traceback methods to date: probabilistic packet marking, deterministic packet marking and network traffic based traceback methods. We formulate each traceback method, and present analysis for them, respectively.
Shui Yu
Chapter 5. DDoS Attack and Defence in Cloud
Abstract
In this chapter, we explore DDoS attack and defence in the incoming dominant cloud computing platform. We firstly answer the question whether we can beat DDoS attacks in cloud with its current attack capability or not, and the cost for countering the attacks. We also discuss a possible architecture of cloud firewall against DDoS attacks.
Shui Yu
Chapter 6. Future Work
Abstract
We summarize the book and discuss the possible future work.
Shui Yu
Metadaten
Titel
Distributed Denial of Service Attack and Defense
verfasst von
Shui Yu
Copyright-Jahr
2014
Verlag
Springer New York
Electronic ISBN
978-1-4614-9491-1
Print ISBN
978-1-4614-9490-4
DOI
https://doi.org/10.1007/978-1-4614-9491-1

Premium Partner