000 04230cam a2200529Ki 4500
001 9781315213125
003 FlBoTFG
005 20220509192935.0
006 m o d
007 cr cnu|||unuuu
008 200826s2020 flua ob 000 0 eng d
040 _aOCoLC-P
_beng
_erda
_epn
_cOCoLC-P
020 _a9781315213125
_q(electronic bk.)
020 _a1315213125
_q(electronic bk.)
020 _a9781351817646
_q(electronic bk. : EPUB)
020 _a1351817647
_q(electronic bk. : EPUB)
020 _a9781351817653
_q(electronic bk. : PDF)
020 _a1351817655
_q(electronic bk. : PDF)
020 _z9780367491543
020 _z9781138626812
035 _a(OCoLC)1190776888
035 _a(OCoLC-P)1190776888
050 4 _aTK5105.59
072 7 _aCOM
_x012040
_2bisacsh
072 7 _aCOM
_x043000
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
072 7 _aUB
_2bicssc
082 0 4 _a005.8/7
_223
100 1 _aBrooks, R. R.
_q(Richard R.),
_eauthor.
245 1 0 _aDistributed denial of service attacks :
_breal-world detection and mitigation /
_cRichard R. Brooks, İlker Özçelik.
250 _aFirst edition.
264 1 _aBoca Raton, FL :
_bChapman and Hall/CRC,
_c2020.
300 _a1 online resource (xxiv, 398 pages) :
_billustration
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
505 0 _aTable of ContentsList of FiguresList of TablesForewordAbout the AuthorsAcknowledgementsPrefaceContributorsIntroductionWhat is DDoS?History and MotivationLegal ConsiderationsDDoS Research: TrafficDDoS Research: TestingDDoS Research: EvaluationAttack DetectionDeceiving DDoS DetectionDetecting DDoS Attack TrafficAttack MitigationSecurity and DDoS in SDN: Opportunities and ChallengesDenial of Service Attack in Control SystemsDenial of Service Attack on Phasor Measurement UnitDDoS LabConclusionAppendixBibliographyIndex
520 _aDistributed Denial of Service (DDoS) attacks have become more destructive, wide-spread and harder to control over time. This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated. Students use software defined networking (SDN) technology to created and execute controlled DDoS experiments. They learn how to deploy networks, analyze network performance, and create resilient systems. This book is used for graduate level computer engineering instruction at Clemson University. It augments the traditional graduate computing curricula by integrating: Internet deployment, network security, ethics, contemporary social issues, and engineering principles into a laboratory based course of instruction. Unique features of this book include: A history of DDoS attacks that includes attacker motivations Discussion of cyber-war, censorship, and Internet black-outs SDN based DDoS laboratory assignments Up-to-date review of current DDoS attack techniques and tools Review of the current laws that globally relate to DDoS Abuse of DNS, NTP, BGP and other parts of the global Internet infrastructure to attack networks Mathematics of Internet traffic measurement Game theory for DDoS resilience Construction of content distribution systems that absorb DDoS attacks This book assumes familiarity with computing, Internet design, appropriate background in mathematics, and some programming skills. It provides analysis and reference material for networking engineers and researchers. By increasing student knowledge in security, and networking; it adds breadth and depth to advanced computing curricula.
588 _aOCLC-licensed vendor bibliographic record.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aDenial of service attacks.
650 7 _aCOMPUTERS / Computer Graphics / Game Programming & Design
_2bisacsh
650 7 _aCOMPUTERS / Networking / General
_2bisacsh
650 7 _aCOMPUTERS / Security / General
_2bisacsh
700 1 _aÖzçelik, İlker,
_eauthor.
856 4 0 _3Taylor & Francis
_uhttps://www.taylorfrancis.com/books/9781315213125
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
999 _c126938
_d126938