home libri books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

bhattacharyya dhruba kumar; kalita jugal kumar - ddos attacks

DDoS Attacks Evolution, Detection, Prevention, Reaction, and Tolerance

;




Disponibilità: Normalmente disponibile in 20 giorni
A causa di problematiche nell'approvvigionamento legate alla Brexit sono possibili ritardi nelle consegne.


PREZZO
123,98 €
NICEPRICE
117,78 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Pubblicazione: 04/2016
Edizione: 1° edizione





Note Editore

DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with the goal of tolerating the attack. It introduces types and characteristics of DDoS attacks, reasons why such attacks are often successful, what aspects of the network infrastructure are usual targets, and methods used to launch attacks. The book elaborates upon the emerging botnet technology, current trends in the evolution and use of botnet technology, its role in facilitating the launching of DDoS attacks, and challenges in countering the role of botnets in the proliferation of DDoS attacks. It introduces statistical and machine learning methods applied in the detection and prevention of DDoS attacks in order to provide a clear understanding of the state of the art. It presents DDoS reaction and tolerance mechanisms with a view to studying their effectiveness in protecting network resources without compromising the quality of services. To practically understand how attackers plan and mount DDoS attacks, the authors discuss the development of a testbed that can be used to perform experiments such as attack launching, monitoring of network traffic, and detection of attacks, as well as for testing strategies for prevention, reaction, and mitigation. Finally, the authors address current issues and challenges that need to be overcome to provide even better defense against DDoS attacks.




Sommario

IntroductionAnomalies in NetworksDistributed Denial-of-Service (DDoS) AttacksCauses of DDoS AttacksTargets of DDoS AttacksLaunching of DDoS AttacksCurrent Trends in Botnet TechnologyMachine Learning in DDoS Attack HandlingDDoS DefenseModules of a DDoS Defense SystemTypes of DDoS Defense SystemsDDoS Tools and SystemsDDoS Defense EvaluationPrior WorkContribution of This BookOrganization of This BookDDoS Attacks, Machine Learning, and MeasuresIssues in Internet DesignDDoS Attacks and Their TypesDDoS Attack TargetsCurrent Trends in DDoS AttacksStrength of DDoS AttackersDesired Characteristics of DDoS Defense SystemRecent DDoS AttacksMachine Learning BackgroundSome Empirical StudiesChapter SummaryBotnets: Trends and ChallengesDDoS Attacks Using Stationary BotnetsChapter Summary and RecommendationsDDoS DetectionModules of a DDoS Defense SolutionTypes of DDoS Defense SolutionsDDoS Detection TechniquesChapter SummaryDDoS PreventionDDoS Prevention TechniquesChapter SummaryDDoS Reaction and ToleranceIntrusion Response System (IRS)DDoS Tolerance Approaches and MethodsChapter SummaryTools and SystemsIntroductionTypes of Network Security ToolsObservationsTUCANNON+: DDoS Attack-Generation and Monitoring ToolTUCannon ArchitectureTUMonitor: Traffic Monitoring Module in TUCANNON+DDoS Defense SystemsChapter SummaryResearch Challenges and RecommendationsConclusionResearch Challenges




Autore

Dhruba Kumar Bhattacharyya is a professor in computer science and engineering at Tezpur University, where he earned his PhD degree in cryptography and error-control coding in 1999. His research areas include network security, data mining, and bioinformatics. He has published more than 200 research articles in leading international journals and peer-reviewed conference proceedings. Dr. Bhattacharyya has authored three technical reference books and edited eight technical volumes. Under his guidance, thirteen students have received their PhD degrees in the areas of machine learning, bioinformatics, and network security. He is on the editorial board of several international journals. Jugal Kumar Kalita teaches computer science at the University of Colorado, Colorado Springs. He earned his MS and PhD degrees in computer and information science from the University of Pennsylvania in Philadelphia in 1988 and 1990, respectively. Prior to that, he earned an MSc from the University of Saskatchewan in Saskatoon, Canada, in 1984, and a BTech from the Indian Institute of Technology, Kharagpur, in 1982. His expertise is in the areas of artificial intelligence and machine learning and the application of techniques in machine learning to network security, natural language processing, and bioinformatics.










Altre Informazioni

ISBN:

9781498729642

Condizione: Nuovo
Dimensioni: 9.25 x 6.25 in Ø 1.25 lb
Formato: Copertina rigida
Illustration Notes:88 b/w images and 16 tables
Pagine Arabe: 312


Dicono di noi