Preface |
|
xi | |
Acknowledgements |
|
xiii | |
About the Authors |
|
xv | |
|
1 Fundamentals of DDoS Attack: Evolution and Challenges |
|
|
1 | (18) |
|
1.1 DDoS Attack: Fundamentals |
|
|
2 | (5) |
|
1.1.1 Statistics and Recent Trends |
|
|
2 | (2) |
|
1.1.2 DDoS Attack Evolution |
|
|
4 | (1) |
|
|
5 | (1) |
|
1.1.3.1 Centralised architecture |
|
|
6 | (1) |
|
1.1.3.2 Peer to peer (P2P) architecture |
|
|
6 | (1) |
|
1.1.3.3 Hybrid architecture |
|
|
6 | (1) |
|
1.1.3.4 HTTP2P (HTTP peer to peer) architecture |
|
|
6 | (1) |
|
1.2 Taxonomy of DDoS Attacks |
|
|
7 | (6) |
|
1.2.1 Types of DDoS Attacks |
|
|
7 | (1) |
|
1.2.1.1 Voluminous attack |
|
|
7 | (1) |
|
1.2.1.2 Protocol-based attack |
|
|
7 | (3) |
|
1.2.1.3 Application layer attack |
|
|
10 | (1) |
|
1.2.2 Classification Based on Degree of Automation |
|
|
11 | (1) |
|
|
11 | (1) |
|
1.2.2.2 Semiautomatic attack |
|
|
11 | (1) |
|
|
12 | (1) |
|
1.2.3 Classification Based on Vulnerability Exploited |
|
|
12 | (1) |
|
1.2.3.1 Volumetric attack |
|
|
12 | (1) |
|
1.2.3.2 Amplification attack |
|
|
12 | (1) |
|
1.2.3.3 Deformed packet attack |
|
|
12 | (1) |
|
1.2.3.4 Protocol-based attack |
|
|
13 | (1) |
|
1.2.4 Classification Based on Attack Rate |
|
|
13 | (1) |
|
|
13 | (1) |
|
1.2.4.2 Variable rate attack |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (3) |
|
|
16 | (3) |
|
|
16 | (3) |
|
2 Role of Incentives, Liabilities, and Cyber Insurance |
|
|
19 | (16) |
|
2.1 Economic Factors for Cybersecurity |
|
|
19 | (12) |
|
2.1.1 Misaligned Incentives |
|
|
21 | (1) |
|
2.1.2 Asymmetries in Information |
|
|
22 | (3) |
|
2.1.2.1 Adverse selection |
|
|
25 | (1) |
|
|
25 | (1) |
|
2.1.3 Vulnerability Trade |
|
|
26 | (1) |
|
|
27 | (4) |
|
|
31 | (4) |
|
|
31 | (4) |
|
3 Taxonomy of DDoS Defence Mechanisms |
|
|
35 | (22) |
|
3.1 Challenges in DDoS Defensive Mechanisms |
|
|
35 | (13) |
|
3.1.1 Classification Based on Methodology Used |
|
|
38 | (1) |
|
3.1.1.1 Soft computing-based solutions |
|
|
38 | (1) |
|
3.1.1.2 Statistical-based solutions |
|
|
38 | (1) |
|
3.1.1.3 Machine learning-based solutions |
|
|
38 | (1) |
|
3.1.1.4 Knowledge-based solutions |
|
|
38 | (7) |
|
3.1.2 Taxonomy Based on Deployment Point |
|
|
45 | (1) |
|
3.1.2.1 Near to source-based solutions |
|
|
45 | (1) |
|
3.1.2.2 Near to destination-based solutions |
|
|
45 | (1) |
|
3.1.2.3 Defensive mechanisms deployable at intermediate routers |
|
|
45 | (3) |
|
|
48 | (1) |
|
|
48 | (9) |
|
|
51 | (6) |
|
4 Taxonomy of Economical Solutions |
|
|
57 | (18) |
|
4.1 Cybersecurity Economics |
|
|
57 | (12) |
|
|
60 | (1) |
|
4.1.1.1 Best effort service-based pricing |
|
|
60 | (3) |
|
4.1.1.2 Basic pricing schemes |
|
|
63 | (3) |
|
4.1.1.3 Pricing schemes for QoS guarantee |
|
|
66 | (3) |
|
4.2 Challenges in Pricing Schemes |
|
|
69 | (2) |
|
|
71 | (4) |
|
|
71 | (4) |
|
5 DDoS Attacks on Various Platforms |
|
|
75 | (24) |
|
5.1 DDoS Attack and Cloud Computing |
|
|
75 | (9) |
|
5.1.1 Taxonomy of DDoS Attacks on Cloud Computing |
|
|
76 | (4) |
|
5.1.2 Taxonomy of DDoS Defence Mechanisms on Cloud |
|
|
80 | (1) |
|
5.1.2.1 DDoS attack prevention on cloud |
|
|
81 | (3) |
|
5.1.2.2 DDoS attack detection on cloud |
|
|
84 | (1) |
|
5.1.2.3 DDoS attack mitigation on cloud |
|
|
84 | (1) |
|
|
84 | (9) |
|
5.2.1 Taxonomy of DDoS Attacks on IoT |
|
|
88 | (1) |
|
5.2.1.1 Application layer DDoS attacks |
|
|
88 | (1) |
|
5.2.1.2 Adaptation layer DDoS attacks |
|
|
88 | (1) |
|
5.2.1.3 Network layer DDoS attacks |
|
|
88 | (1) |
|
5.2.2 Botnet-based Attacks in IoT |
|
|
89 | (1) |
|
5.2.3 Taxonomy of DDoS Defences in IoT |
|
|
90 | (1) |
|
5.2.3.1 Attack prevention |
|
|
90 | (1) |
|
|
91 | (1) |
|
5.2.3.3 Attack mitigation |
|
|
92 | (1) |
|
|
93 | (6) |
|
|
94 | (5) |
|
6 Emerging Solutions for DDoS Attack: Based on SDN and Blockchain Technologies |
|
|
99 | (24) |
|
6.1 SDN as the New Solution |
|
|
100 | (6) |
|
|
101 | (2) |
|
6.1.2 DDoS Attacks on SDN |
|
|
103 | (1) |
|
6.1.2.1 DDoS attacks on application plane |
|
|
103 | (1) |
|
6.1.2.2 DDoS attacks on control plane |
|
|
103 | (1) |
|
6.1.2.3 DDoS attacks on data plane |
|
|
103 | (1) |
|
6.1.3 Open Research Issues and Challenges |
|
|
104 | (2) |
|
6.2 Blockchain as a Solution to DDoS Attacks |
|
|
106 | (11) |
|
6.2.1 Advantages of Blockchain in Mitigating DDoS Attacks |
|
|
107 | (1) |
|
6.2.2 Architecture of Blockchain |
|
|
108 | (1) |
|
6.2.3 Features of Blockchain |
|
|
109 | (1) |
|
6.2.4 Open Challenges and Issues in Blockchain Technology |
|
|
110 | (2) |
|
6.2.5 Security Issues and Challenges |
|
|
112 | (3) |
|
6.2.6 Blockchain Vulnerabilities |
|
|
115 | (2) |
|
|
117 | (6) |
|
|
118 | (5) |
Index |
|
123 | |