• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Theoretical and experimental methods for defending against DDoS attacks

پدید آورنده
Mohammad Reza Khalifeh Soltanian, Iraj Sadegh Amiri (University of Malaya, Kuala Lumpur, Malaysia) ; Matthew Neely, technical editor.

موضوع
Computer networks-- Security measures.,Denial of service attacks.

رده

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
9780128053997
Erroneous ISBN
9780128053911

NATIONAL BIBLIOGRAPHY NUMBER

Number
dltt

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Theoretical and experimental methods for defending against DDoS attacks
General Material Designation
[Book]
First Statement of Responsibility
Mohammad Reza Khalifeh Soltanian, Iraj Sadegh Amiri (University of Malaya, Kuala Lumpur, Malaysia) ; Matthew Neely, technical editor.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource :
Other Physical Details
illustrations.

SERIES

Series Title
Advanced topics in information security

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references.

SUMMARY OR ABSTRACT

Text of Note
This book presents research and methodologies along with a proposed algorithm for prevention of Denial of Service (DoS) attacks that has been written based on cryptographic concepts, such as birthday attacks, to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks. This resource contains a comprehensive study on the basics of network security; provides a wide revision on client puzzle theory; gives an experimental model to mitigate distributed denial of service (DDoS) attacks. --

TOPICAL NAME USED AS SUBJECT

Computer networks-- Security measures.
Denial of service attacks.

PERSONAL NAME - PRIMARY RESPONSIBILITY

Soltanian, Mohammad Reza Khalifeh

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Amiri, Iraj Sadegh,1977-
Neely, Matthew

CORPORATE BODY NAME - ALTERNATIVE RESPONSIBILITY

Books24x7, Inc.

ORIGINATING SOURCE

Date of Transaction
20160502143200.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival