Theoretical and experimental methods for defending against DDoS attacks / (Record no. 1547)

MARC details
000 -LEADER
fixed length control field 02922cam a22003377i 4500
001 - CONTROL NUMBER
control field 19542246
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230112122222.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 170307s2016 ne a b 000 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2017288154
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128053911
Qualifying information (pbk.)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
Modifying agency GSU
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5109.59
Item number SOL
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Soltanian, Mohammad Reza Khalifeh,
Relator term author.
245 10 - TITLE STATEMENT
Title Theoretical and experimental methods for defending against DDoS attacks /
Statement of responsibility, etc. Mohammad Reza Khalifeh Soltanian, Iraj Sadegh Amiri ; Matthew Neely, technical editor.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Amsterdam :
Name of producer, publisher, distributor, manufacturer Elsevier ;
-- Syngress,
Date of production, publication, distribution, manufacture, or copyright notice [2016]
300 ## - PHYSICAL DESCRIPTION
Extent viii, 62 pages :
Other physical details illustrations ;
Dimensions 23 cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
490 0# - SERIES STATEMENT
Series statement Syngress advanced topics in information security
500 ## - GENERAL NOTE
General note Minimal Level Cataloging Plus.
Institution to which field applies DLC
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (pages 59-62).
520 ## - SUMMARY, ETC.
Summary, etc. Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim's IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Denial of service attacks.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Amiri, Iraj Sadegh,
Dates associated with a name 1977-
Relator term author.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c origres
d 4
e ncip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Inventory number Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Library of Congress Classification       GSU Library Epoch GSU Library Epoch General Stacks 21/12/2022 BAI 04146   TK5109.59SOL 50000005289 12/01/2023 12/01/2023 Books