Distributed Denial of Service Attacks

Real-world Detection and Mitigation

Ilker Ozcelik, Richard Brooks

PDF
ca. 72,80
Amazon iTunes Thalia.de Weltbild.de Hugendubel Bücher.de ebook.de kobo Osiander Google Books Barnes&Noble bol.com Legimi yourbook.shop Kulturkaufhaus ebooks-center.de
* Affiliatelinks/Werbelinks
Hinweis: Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.

CRC Press img Link Publisher

Naturwissenschaften, Medizin, Informatik, Technik / Informatik, EDV

Beschreibung

Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread and harder to control over time. This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated. Students use software defined networking (SDN) technology to created and execute controlled DDoS experiments. They learn how to deploy networks, analyze network performance, and create resilient systems.This book is used for graduate level computer engineering instruction at Clemson University. It augments the traditional graduate computing curricula by integrating: Internet deployment, network security, ethics, contemporary social issues, and engineering principles into a laboratory based course of instruction. Unique features of this book include:A history of DDoS attacks that includes attacker motivationsDiscussion of cyber-war, censorship, and Internet black-outsSDN based DDoS laboratory assignmentsUp-to-date review of current DDoS attack techniques and toolsReview of the current laws that globally relate to DDoSAbuse of DNS, NTP, BGP and other parts of the global Internet infrastructure to attack networksMathematics of Internet traffic measurementGame theory for DDoS resilienceConstruction of content distribution systems that absorb DDoS attacksThis book assumes familiarity with computing, Internet design, appropriate background in mathematics, and some programming skills. It provides analysis and reference material for networking engineers and researchers. By increasing student knowledge in security, and networking; it adds breadth and depth to advanced computing curricula.

Weitere Titel von diesem Autor

Kundenbewertungen