DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance
- Length: 312 pages
- Edition: 1
- Language: English
- Publisher: Chapman and Hall/CRC
- Publication Date: 2016-05-13
- ISBN-10: 1498729649
- ISBN-13: 9781498729642
- Sales Rank: #1837743 (See Top 100 Books)
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with the goal of tolerating the attack. It introduces types and characteristics of DDoS attacks, reasons why such attacks are often successful, what aspects of the network infrastructure are usual targets, and methods used to launch attacks.
The book elaborates upon the emerging botnet technology, current trends in the evolution and use of botnet technology, its role in facilitating the launching of DDoS attacks, and challenges in countering the role of botnets in the proliferation of DDoS attacks. It introduces statistical and machine learning methods applied in the detection and prevention of DDoS attacks in order to provide a clear understanding of the state of the art. It presents DDoS reaction and tolerance mechanisms with a view to studying their effectiveness in protecting network resources without compromising the quality of services.
To practically understand how attackers plan and mount DDoS attacks, the authors discuss the development of a testbed that can be used to perform experiments such as attack launching, monitoring of network traffic, and detection of attacks, as well as for testing strategies for prevention, reaction, and mitigation. Finally, the authors address current issues and challenges that need to be overcome to provide even better defense against DDoS attacks.
Table of Contents
Chapter 1 – Introduction
Chapter 2 – DDoS, Machine Learning, Measures
Chapter 3 – Botnets: Trends and Challenges
Chapter 4 – DDoS Detection
Chapter 5 – DDoS Prevention
Chapter 6 – DDoS Reaction and Tolerance
Chapter 7 – Tools and Systems
Chapter 8 – Conclusion and Research Challenges