• Complain

Brij B. Gupta - Distributed Denial of Service (DDoS) Attacks

Here you can read online Brij B. Gupta - Distributed Denial of Service (DDoS) Attacks full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2020, publisher: CRC Press, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Brij B. Gupta Distributed Denial of Service (DDoS) Attacks

Distributed Denial of Service (DDoS) Attacks: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Distributed Denial of Service (DDoS) Attacks" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Brij B. Gupta: author's other books


Who wrote Distributed Denial of Service (DDoS) Attacks? Find out the surname, the name of the author of the book and a list of all author's works by series.

Distributed Denial of Service (DDoS) Attacks — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Distributed Denial of Service (DDoS) Attacks" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Distributed Denial of Service DDoS Attacks First edition published 2021 by - photo 1

Distributed Denial of Service (DDoS) Attacks

First edition published 2021

by CRC Press

6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742

and by CRC Press

2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN

2021 Taylor & Francis Group, LLC

CRC Press is an imprint of Taylor & Francis Group, LLC

Reasonable efforts have been made to publish reliable data and information, but theauthor and publisher cannot assume responsibility for the validity of all materialsor the consequences of their use. The authors and publishers have attempted to tracethe copyright holders of all material reproduced in this publication and apologizeto copyright holders if permission to publish in this form has not been obtained.If any copyright material has not been acknowledged please write and let us know sowe may rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted,reproduced, transmitted, or utilized in any form by any electronic, mechanical, orother means, now known or hereafter invented, including photocopying, microfilming,and recording, or in any information storage or retrieval system, without writtenpermission from the publishers.

For permission to photocopy or use material electronically from this work, access

Trademark notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe.

ISBN: 9780367619749 (hbk)

ISBN: 9781003107354 (ebk)

Typeset in Times LT Std

by KnowledgeWorks Global Ltd.

To my parents and family for their constant support during the course of this book

B. B. Gupta

To my parents, beloved husband, and my mentor for their motivation throughout the journey of writing this book.

Amrita Dahiya

Massive technological breakthroughs have pioneered the complexity, scale, and magnitude of DDoS attacks from a very simple Trinoo platform to the Mirai botnet. The days are gone when DDoS attacks were bound to run iterations for vandalism in the small-scale network. Nowadays, DDoS attacks are a major concern for e-companies, as most businesses rely on online access and the Internet for delivering services, since the Internet was developed for applicability and not security. In addition, enormous development in vulnerable and insecure IoT applications, amplification, and reflective techniques has worsened the situation. Progressively, attackers are always driven by large incentives as compared to the legitimate users or defenders. Consequently, the frequency and intensity of the DDoS attacks is rising at an exponential pace resulting in unparalleled levels of damage. There is no denying the fact that researchers have tried to keep the momentum of proposing defensive mechanisms apace with the massive modernisation of attacking techniques. However, we still lack in a comprehensive and robust DDoS defensive mechanism. Thus, it is very important to analyse the recent trends and different DDoS attack mitigation solutions to explore new research directions.

Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges, and Countermeasures provides an overview of the basic concepts of DDoS attacks, its different types, modes of attack, and examines the various countermeasures that have been proposed so far. In this book, we discuss the importance of incentives, liabilities, and cyber insurance in any technical solution and have provided a detailed taxonomy of technical and economical defensive solutions against DDoS attacks. Further, the book covers various issues and challenges encountered by different platforms like cloud computing and IoT in dealing with the DDoS attacks. In addition, we discuss SDN and blockchain as the new emerging solutions to DDoS attacks due to their unique and unparalleled features. Features like decoupling of data and control plane in SDN and decentralisation of blockchain can provide promising solutions in this particular domain. The book emphasises the idea of moving from only technical solutions to a proper blend of technical and economical solutions against DDoS attacks. It also outlines the existing challenges and provides an insight into future research directions.

This book is designed for the readers with an interest in the cybersecurity domain, including researchers who are exploring different dimensions associated with the DDoS attacks, developers and security professionals who are focusing on developing defensive schemes and applications for detecting or mitigating DDoS attacks, industrialists who are keen of promoting their security measures or their cyber insurance policies and services with new features, and faculty members across different universities.

The book contains six chapters, with each chapter focusing on bringing an understanding and knowledge of DDoS attacks and their taxonomy along with their defensive mechanisms to the readers. The following list provides a detailed overview of the topics covered in each chapter:

: Fundamentals of DDoS attack: Evolution and Challenges This chapter introduces the concept of DDoS attacks as a starting point for newcomers to the technology and illuminates some major recent trends and statistics unveiled by well-known organisations across the world showcasing the exponential rise in magnitude, severity, and complexity of DDoS attacks. Further, this chapter discusses the evolution of DDoS attacks and their detailed taxonomy based on various parameters.

: Role of Incentives, Liabilities, and Cyber Insurance This chapter illuminates the importance of incentives and liabilities in any DDoS defensive mechanism. It highlights cyber insurance and its conceptualisation in the risk assessment process. It discusses the fact that weak defense mechanisms, fragile cryptographic protocols, and loose access control policies are not the only reasons, but the lack of incentives and liabilities also contribute significantly to security breaches.

: Taxonomy of DDoS Defence Mechanisms This chapter highlights the detailed taxonomy of DDoS defense mechanisms. Apart from this, it also covers open research challenges and issues in any trivial DDoS defense mechanism.

: Taxonomy of Economical Solutions This chapter discusses the classification of economic defensive mechanisms against DDoS attacks. Various payment schemes, resource allocation schemes, negotiation-based solutions, and Internet pricing schemes are discussed in this chapter. Pros and cons of economic solutions are also discussed.

: DDoS Attacks on Various Platforms This chapter illustrates DDoS attacks on platforms like cloud computing and IoT. It covers vulnerabilities, issues, and challenges associated with these platforms with regard to DDoS attack. Apart from this, this chapter also highlights taxonomy of DDoS attacks and some significant defensive solutions on cloud computing and IoT.

: Emerging Solutions for DDoS attacks: Based on SDN and Blockchain Technologies This chapter illustrates some new emerging solutions for handling DDoS attacks, i.e., Software Defined Networking (SDN) and blockchain-based solutions. It also covers advantages of these technologies in mitigating DDoS attacks.

Writing a book is not a work of an individual, but it is the outcome of the incessant support of our loved ones. This book is the result of the inestimable hard work, continuous efforts, and assistance of loved ones. Therefore, we would like to express our gratefulness to each one of them who are linked with this book, directly or indirectly, for their cooperation and creative ideas for ameliorating the quality of this book. We would also like to express our appreciation for CRC Press, Taylor & Francis Group, editor and staff for their assistance and unfailing support. We are grateful, from the bottom of our hearts, to our family members for their absolute love and countless prayers. This experience has been both internally challenging and rewarding. Therefore, again, special thanks to all who helped us in making this happen. Finally, we would like to express our gratitude to God by bowing our heads for lavishing on us continuous blessings and the enthusiasm to complete this book.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Distributed Denial of Service (DDoS) Attacks»

Look at similar books to Distributed Denial of Service (DDoS) Attacks. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Distributed Denial of Service (DDoS) Attacks»

Discussion, reviews of the book Distributed Denial of Service (DDoS) Attacks and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.