Distributed denial of service (DDoS) attacks : classification, attacks, challenges, and countermeasures / Brij B. Gupta and Amrita Dahiya.

Author
Gupta, Brij B. [Browse]
Format
Book
Language
English
Εdition
1st ed.
Published/​Created
  • Boca Raton, FL ; London ; New York : CRC Press, Taylor & Francis Group, [2021]
  • 2021
Description
1 online resource (141 pages).

Availability

Available Online

Details

Subject(s)
Author
Series
Summary note
This book is designed for readers who have an interest in the cyber security domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals focusing on defensive schemes and applications for detecting or mitigating DDoS attacks.
Source of description
Description based on print version record.
Contents
  • Cover
  • Half Title
  • Title Page
  • Copyright Page
  • Dedication
  • Contents
  • Preface
  • Acknowledgements
  • About the Authors
  • 1. Fundamentals of DDoS Attack: Evolution and Challenges
  • 1.1. DDoS Attack: Fundamentals
  • 1.1.1. Statistics and Recent Trends
  • 1.1.2. DDoS Attack Evolution
  • 1.1.3. Botnet Structure
  • 1.1.3.1. Centralised architecture
  • 1.1.3.2. Peer to peer (PP) architecture
  • 1.1.3.3. Hybrid architecture
  • 1.1.3.4. HTTPP (HTTP peer to peer) architecture
  • 1.2. Taxonomy of DDoS Attacks
  • 1.2.1. Types of DDoS Attacks
  • 1.2.1.1. Voluminous attack
  • 1.2.1.2. Protocol-based attack
  • 1.2.1.3. Application layer attack
  • 1.2.2. Classification Based on Degree of Automation
  • 1.2.2.1. Manual attack
  • 1.2.2.2. Semiautomatic attack
  • 1.2.2.3. Automatic attack
  • 1.2.3. Classification Based on Vulnerability Exploited
  • 1.2.3.1. Volumetric attack
  • 1.2.3.2. Amplification attack
  • 1.2.3.3. Deformed packet attack
  • 1.2.3.4. Protocol-based attack
  • 1.2.4. Classification Based on Attack Rate
  • 1.2.4.1. High rate attack
  • 1.2.4.2. Variable rate attack
  • 1.2.4.3. Low rate attack
  • 1.3. Attack Tools
  • 1.4. Chapter Summary
  • References
  • 2. Role of Incentives, Liabilities, and Cyber Insurance
  • 2.1. Economic Factors for Cybersecurity
  • 2.1.1. Misaligned Incentives
  • 2.1.2. Asymmetries in Information
  • 2.1.2.1. Adverse selection
  • 2.1.2.2. Moral hazard
  • 2.1.3. Vulnerability Trade
  • 2.1.4. Cyber Insurance
  • 2.2. Chapter Summary
  • 3. Taxonomy of DDoS Defence Mechanisms
  • 3.1. Challenges in DDoS Defensive Mechanisms
  • 3.1.1. Classification Based on Methodology Used
  • 3.1.1.1. Soft computing-based solutions
  • 3.1.1.2. Statistical-based solutions
  • 3.1.1.3. Machine learning-based solutions
  • 3.1.1.4. Knowledge-based solutions
  • 3.1.2. Taxonomy Based on Deployment Point.
  • 3.1.2.1. Near to source-based solutions
  • 3.1.2.2. Near to destination-based solutions
  • 3.1.2.3. Defensive mechanisms deployable at intermediate routers
  • 3.1.2.4. Hybrid solutions
  • 3.2. Chapter Summary
  • 4. Taxonomy of Economical Solutions
  • 4.1. Cybersecurity Economics
  • 4.1.1. Pricing Strategies
  • 4.1.1.1. Best effort service-based pricing
  • 4.1.1.2. Basic pricing schemes
  • 4.1.1.3. Pricing schemes for QoS guarantee
  • 4.2. Challenges in Pricing Schemes
  • 4.3. Chapter Summary
  • 5. DDoS Attacks on Various Platforms
  • 5.1. DDoS Attack and Cloud Computing
  • 5.1.1. Taxonomy of DDoS Attacks on Cloud Computing
  • 5.1.2. Taxonomy of DDoS Defence Mechanisms on Cloud
  • 5.1.2.1. DDoS attack prevention on cloud
  • 5.1.2.2. DDoS attack detection on cloud
  • 5.1.2.3. DDoS attack mitigation on cloud
  • 5.2. DDoS Attacks in IoT
  • 5.2.1. Taxonomy of DDoS Attacks on IoT
  • 5.2.1.1. Application layer DDoS attacks
  • 5.2.1.2. Adaptation layer DDoS attacks
  • 5.2.1.3. Network layer DDoS attacks
  • 5.2.2. Botnet-based Attacks in IoT
  • 5.2.3. Taxonomy of DDoS Defences in IoT
  • 5.2.3.1. Attack prevention
  • 5.2.3.2. Attack detection
  • 5.2.3.3. Attack mitigation
  • 5.3. Chapter Summary
  • 6. Emerging Solutions for DDoS Attack: Based on SDN and Blockchain Technologies
  • 6.1. SDN as the New Solution
  • 6.1.1. Advantages of SDN
  • 6.1.2. DDoS Attacks on SDN
  • 6.1.2.1. DDoS attacks on application plane
  • 6.1.2.2. DDoS attacks on control plane
  • 6.1.2.3. DDoS attacks on data plane
  • 6.1.3. Open Research Issues and Challenges
  • 6.2. Blockchain as a Solution to DDoS Attacks
  • 6.2.1. Advantages of Blockchain in Mitigating DDoS Attacks
  • 6.2.2. Architecture of Blockchain
  • 6.2.3. Features of Blockchain
  • 6.2.4. Open Challenges and Issues in Blockchain Technology
  • 6.2.5. Security Issues and Challenges.
  • 6.2.6. Blockchain Vulnerabilities
  • 6.3. Chapter Summary
  • Index.
ISBN
  • 1-00-310735-4
  • 1-003-10735-4
  • 1-000-34707-9
Statement on language in description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage. Read more...
Other views
Staff view

Supplementary Information