Theoretical and experimental methods for defending against DDoS attacks
General Material Designation
[Book]
First Statement of Responsibility
Mohammad Reza Khalifeh Soltanian, Iraj Sadegh Amiri (University of Malaya, Kuala Lumpur, Malaysia) ; Matthew Neely, technical editor.
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
1 online resource :
Other Physical Details
illustrations.
SERIES
Series Title
Advanced topics in information security
INTERNAL BIBLIOGRAPHIES/INDEXES NOTE
Text of Note
Includes bibliographical references.
SUMMARY OR ABSTRACT
Text of Note
This book presents research and methodologies along with a proposed algorithm for prevention of Denial of Service (DoS) attacks that has been written based on cryptographic concepts, such as birthday attacks, to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks. This resource contains a comprehensive study on the basics of network security; provides a wide revision on client puzzle theory; gives an experimental model to mitigate distributed denial of service (DDoS) attacks. --