Atnaujinkite slapukų nuostatas

El. knyga: Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures [Taylor & Francis e-book]

(Director, International Center for AI & CCRI),
  • Formatas: 124 pages, 17 Tables, black and white; 10 Illustrations, black and white
  • Išleidimo metai: 01-Mar-2021
  • Leidėjas: CRC Press
  • ISBN-13: 9781003107354
  • Taylor & Francis e-book
  • Kaina: 68,31 €*
  • * this price gives unlimited concurrent access for unlimited time
  • Standartinė kaina: 97,59 €
  • Sutaupote 30%
  • Formatas: 124 pages, 17 Tables, black and white; 10 Illustrations, black and white
  • Išleidimo metai: 01-Mar-2021
  • Leidėjas: CRC Press
  • ISBN-13: 9781003107354
The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them.

Features:











Covers topics that describe taxonomies of the DDoS attacks in detail, recent trends and classification of defensive mechanisms on the basis of deployment location, the types of defensive action, and the solutions offering economic incentives.





Introduces chapters discussing the various types of DDoS attack associated with different layers of security, an attackers motivations, and the importance of incentives and liabilities in any defensive solution.





Illustrates the role of fair resource-allocation schemes, separate payment mechanisms for attackers and legitimate users, negotiation models on cost and types of resources, and risk assessments and transfer mechanisms.

DDoS Attacks Classification, Attacks, Challenges, and Countermeasures is designed for the readers who have an interest in the cybersecurity domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals who are focusing on developing defensive schemes and applications for detecting or mitigating the DDoS attacks, and faculty members across different universities.
Preface xi
Acknowledgements xiii
About the Authors xv
1 Fundamentals of DDoS Attack: Evolution and Challenges
1(18)
1.1 DDoS Attack: Fundamentals
2(5)
1.1.1 Statistics and Recent Trends
2(2)
1.1.2 DDoS Attack Evolution
4(1)
1.1.3 Botnet Structure
5(1)
1.1.3.1 Centralised architecture
6(1)
1.1.3.2 Peer to peer (P2P) architecture
6(1)
1.1.3.3 Hybrid architecture
6(1)
1.1.3.4 HTTP2P (HTTP peer to peer) architecture
6(1)
1.2 Taxonomy of DDoS Attacks
7(6)
1.2.1 Types of DDoS Attacks
7(1)
1.2.1.1 Voluminous attack
7(1)
1.2.1.2 Protocol-based attack
7(3)
1.2.1.3 Application layer attack
10(1)
1.2.2 Classification Based on Degree of Automation
11(1)
1.2.2.1 Manual attack
11(1)
1.2.2.2 Semiautomatic attack
11(1)
1.2.2.3 Automatic attack
12(1)
1.2.3 Classification Based on Vulnerability Exploited
12(1)
1.2.3.1 Volumetric attack
12(1)
1.2.3.2 Amplification attack
12(1)
1.2.3.3 Deformed packet attack
12(1)
1.2.3.4 Protocol-based attack
13(1)
1.2.4 Classification Based on Attack Rate
13(1)
1.2.4.1 High rate attack
13(1)
1.2.4.2 Variable rate attack
13(1)
1.2.4.3 Low rate attack
13(1)
1.3 Attack Tools
13(3)
1.4
Chapter Summary
16(3)
References
16(3)
2 Role of Incentives, Liabilities, and Cyber Insurance
19(16)
2.1 Economic Factors for Cybersecurity
19(12)
2.1.1 Misaligned Incentives
21(1)
2.1.2 Asymmetries in Information
22(3)
2.1.2.1 Adverse selection
25(1)
2.1.2.2 Moral hazard
25(1)
2.1.3 Vulnerability Trade
26(1)
2.1.4 Cyber Insurance
27(4)
2.2
Chapter Summary
31(4)
References
31(4)
3 Taxonomy of DDoS Defence Mechanisms
35(22)
3.1 Challenges in DDoS Defensive Mechanisms
35(13)
3.1.1 Classification Based on Methodology Used
38(1)
3.1.1.1 Soft computing-based solutions
38(1)
3.1.1.2 Statistical-based solutions
38(1)
3.1.1.3 Machine learning-based solutions
38(1)
3.1.1.4 Knowledge-based solutions
38(7)
3.1.2 Taxonomy Based on Deployment Point
45(1)
3.1.2.1 Near to source-based solutions
45(1)
3.1.2.2 Near to destination-based solutions
45(1)
3.1.2.3 Defensive mechanisms deployable at intermediate routers
45(3)
3.1.2.4 Hybrid solutions
48(1)
3.2
Chapter Summary
48(9)
References
51(6)
4 Taxonomy of Economical Solutions
57(18)
4.1 Cybersecurity Economics
57(12)
4.1.1 Pricing Strategies
60(1)
4.1.1.1 Best effort service-based pricing
60(3)
4.1.1.2 Basic pricing schemes
63(3)
4.1.1.3 Pricing schemes for QoS guarantee
66(3)
4.2 Challenges in Pricing Schemes
69(2)
4.3
Chapter Summary
71(4)
References
71(4)
5 DDoS Attacks on Various Platforms
75(24)
5.1 DDoS Attack and Cloud Computing
75(9)
5.1.1 Taxonomy of DDoS Attacks on Cloud Computing
76(4)
5.1.2 Taxonomy of DDoS Defence Mechanisms on Cloud
80(1)
5.1.2.1 DDoS attack prevention on cloud
81(3)
5.1.2.2 DDoS attack detection on cloud
84(1)
5.1.2.3 DDoS attack mitigation on cloud
84(1)
5.2 DDoS Attacks in IoT
84(9)
5.2.1 Taxonomy of DDoS Attacks on IoT
88(1)
5.2.1.1 Application layer DDoS attacks
88(1)
5.2.1.2 Adaptation layer DDoS attacks
88(1)
5.2.1.3 Network layer DDoS attacks
88(1)
5.2.2 Botnet-based Attacks in IoT
89(1)
5.2.3 Taxonomy of DDoS Defences in IoT
90(1)
5.2.3.1 Attack prevention
90(1)
5.2.3.2 Attack detection
91(1)
5.2.3.3 Attack mitigation
92(1)
5.3
Chapter Summary
93(6)
References
94(5)
6 Emerging Solutions for DDoS Attack: Based on SDN and Blockchain Technologies
99(24)
6.1 SDN as the New Solution
100(6)
6.1.1 Advantages of SDN
101(2)
6.1.2 DDoS Attacks on SDN
103(1)
6.1.2.1 DDoS attacks on application plane
103(1)
6.1.2.2 DDoS attacks on control plane
103(1)
6.1.2.3 DDoS attacks on data plane
103(1)
6.1.3 Open Research Issues and Challenges
104(2)
6.2 Blockchain as a Solution to DDoS Attacks
106(11)
6.2.1 Advantages of Blockchain in Mitigating DDoS Attacks
107(1)
6.2.2 Architecture of Blockchain
108(1)
6.2.3 Features of Blockchain
109(1)
6.2.4 Open Challenges and Issues in Blockchain Technology
110(2)
6.2.5 Security Issues and Challenges
112(3)
6.2.6 Blockchain Vulnerabilities
115(2)
6.3
Chapter Summary
117(6)
References
118(5)
Index 123
Brij B. Gupta is Assistant Professor in the Department of Computer Engineering, National Institute of Technology Kurukshetra India. His research interests include Information Security, Cyber Security, Cloud Computing, Web Security, Intrusion Detection and Phishing. He received his PhD degree from Indian Institute of Technology Roorkee, India in the area of Information and Cyber Security. He has published more than 250 research papers in International Journals and Conferences of high repute including IEEE, Elsevier, ACM, Springer, Wiley, Taylor & Francis, and Inderscience. He is serving as associate editor of IEEE Access, IEEE TII, Associate editor of IJICS, Inderscience and Executive editor of IJITCA, Inderscience, respectively.

Amrita Dahiya is a Research Scholar in the Department of Computer Engineering, National Institute of Technology Kurukshetra India