| 000 | 04230cam a2200529Ki 4500 | ||
|---|---|---|---|
| 001 | 9781315213125 | ||
| 003 | FlBoTFG | ||
| 005 | 20220509192935.0 | ||
| 006 | m o d | ||
| 007 | cr cnu|||unuuu | ||
| 008 | 200826s2020 flua ob 000 0 eng d | ||
| 040 |
_aOCoLC-P _beng _erda _epn _cOCoLC-P |
||
| 020 |
_a9781315213125 _q(electronic bk.) |
||
| 020 |
_a1315213125 _q(electronic bk.) |
||
| 020 |
_a9781351817646 _q(electronic bk. : EPUB) |
||
| 020 |
_a1351817647 _q(electronic bk. : EPUB) |
||
| 020 |
_a9781351817653 _q(electronic bk. : PDF) |
||
| 020 |
_a1351817655 _q(electronic bk. : PDF) |
||
| 020 | _z9780367491543 | ||
| 020 | _z9781138626812 | ||
| 035 | _a(OCoLC)1190776888 | ||
| 035 | _a(OCoLC-P)1190776888 | ||
| 050 | 4 | _aTK5105.59 | |
| 072 | 7 |
_aCOM _x012040 _2bisacsh |
|
| 072 | 7 |
_aCOM _x043000 _2bisacsh |
|
| 072 | 7 |
_aCOM _x053000 _2bisacsh |
|
| 072 | 7 |
_aUB _2bicssc |
|
| 082 | 0 | 4 |
_a005.8/7 _223 |
| 100 | 1 |
_aBrooks, R. R. _q(Richard R.), _eauthor. |
|
| 245 | 1 | 0 |
_aDistributed denial of service attacks : _breal-world detection and mitigation / _cRichard R. Brooks, İlker Özçelik. |
| 250 | _aFirst edition. | ||
| 264 | 1 |
_aBoca Raton, FL : _bChapman and Hall/CRC, _c2020. |
|
| 300 |
_a1 online resource (xxiv, 398 pages) : _billustration |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 505 | 0 | _aTable of ContentsList of FiguresList of TablesForewordAbout the AuthorsAcknowledgementsPrefaceContributorsIntroductionWhat is DDoS?History and MotivationLegal ConsiderationsDDoS Research: TrafficDDoS Research: TestingDDoS Research: EvaluationAttack DetectionDeceiving DDoS DetectionDetecting DDoS Attack TrafficAttack MitigationSecurity and DDoS in SDN: Opportunities and ChallengesDenial of Service Attack in Control SystemsDenial of Service Attack on Phasor Measurement UnitDDoS LabConclusionAppendixBibliographyIndex | |
| 520 | _aDistributed Denial of Service (DDoS) attacks have become more destructive, wide-spread and harder to control over time. This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated. Students use software defined networking (SDN) technology to created and execute controlled DDoS experiments. They learn how to deploy networks, analyze network performance, and create resilient systems. This book is used for graduate level computer engineering instruction at Clemson University. It augments the traditional graduate computing curricula by integrating: Internet deployment, network security, ethics, contemporary social issues, and engineering principles into a laboratory based course of instruction. Unique features of this book include: A history of DDoS attacks that includes attacker motivations Discussion of cyber-war, censorship, and Internet black-outs SDN based DDoS laboratory assignments Up-to-date review of current DDoS attack techniques and tools Review of the current laws that globally relate to DDoS Abuse of DNS, NTP, BGP and other parts of the global Internet infrastructure to attack networks Mathematics of Internet traffic measurement Game theory for DDoS resilience Construction of content distribution systems that absorb DDoS attacks This book assumes familiarity with computing, Internet design, appropriate background in mathematics, and some programming skills. It provides analysis and reference material for networking engineers and researchers. By increasing student knowledge in security, and networking; it adds breadth and depth to advanced computing curricula. | ||
| 588 | _aOCLC-licensed vendor bibliographic record. | ||
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 0 | _aDenial of service attacks. | |
| 650 | 7 |
_aCOMPUTERS / Computer Graphics / Game Programming & Design _2bisacsh |
|
| 650 | 7 |
_aCOMPUTERS / Networking / General _2bisacsh |
|
| 650 | 7 |
_aCOMPUTERS / Security / General _2bisacsh |
|
| 700 | 1 |
_aÖzçelik, İlker, _eauthor. |
|
| 856 | 4 | 0 |
_3Taylor & Francis _uhttps://www.taylorfrancis.com/books/9781315213125 |
| 856 | 4 | 2 |
_3OCLC metadata license agreement _uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf |
| 999 |
_c126938 _d126938 |
||