We a good story
Quick delivery in the UK

New Methods for Detection of DoS and DDoS Attacks

About New Methods for Detection of DoS and DDoS Attacks

The Internet revolution has completely changed the traditional ways of functioning of essential applications including banking, healthcare, defense, academic, and logistics. Internet-based services replaced these traditional services at a rapid pace over the past two decades. Growth in internet-dependency of individuals and entities resulted that the internet is the fundamental support for the information world. The emergence of new Internet-based services such as e- governance, e-procurement, and other services are contributing significantly to the global, social and economic development. With the exponential growth in Internet-based services and users worldwide, the internet infrastructure and services are facing numerous challenges related to continuous attacks. Distributed Denial of Service (DDoS) is one of the most observed attacks over internet architecture, posturing robust challenges to defense mechanisms incorporated in the framework. As the DDoS attack information is not made public by companies (to avoid deterioration of brand value), researchers often face the problem of the limited information available to design effective defensive strategies against DDoS attacks. The current section presents the impact of DDoS attack and the inherent vulnerability of the internet architecture. Real events of DDoS attack together with their financial impact on companies are included. Further, the need for designing an efficient DDoS defense strategy is presented in the research work. The internet resources and network systems should be readily accessible for genuine users who aim to use the services at any specific time . Unavailability of internet services and applications at the required instance is one of the major challenges restricting the spread of Internet-based services. The unavailability can results to either intentional causes or accidental causes. The basic internet framework is designed to handle accidental failures but is not efficient against intentional purposes such as intrusion, malware, hacking, etc. The Denial-of-Service (DoS) attack is categorized under intentional failures observed on the internet, which are caused by malware programmers or intruders. These attackers deny or compromise the availability of internet resources to genuine or authorized users.

Show more
  • Language:
  • English
  • ISBN:
  • 9798223026914
  • Binding:
  • Paperback
  • Pages:
  • 366
  • Published:
  • August 21, 2023
  • Dimensions:
  • 140x22x216 mm.
  • Weight:
  • 516 g.
Delivery: 1-2 weeks
Expected delivery: December 1, 2024

Description of New Methods for Detection of DoS and DDoS Attacks

The Internet revolution has completely changed the traditional ways of functioning of
essential applications including banking, healthcare, defense, academic, and logistics.
Internet-based services replaced these traditional services at a rapid pace over the
past two decades. Growth in internet-dependency of individuals and entities resulted that
the internet is the fundamental support for the information
world.
The emergence of new Internet-based services such as e- governance,
e-procurement, and other services are contributing significantly to the global,
social and economic development. With the exponential growth in Internet-based services and
users worldwide, the internet infrastructure and services are facing numerous challenges
related to continuous attacks.
Distributed Denial of Service (DDoS) is one of the most observed attacks over internet
architecture, posturing robust challenges to defense
mechanisms incorporated in the framework. As the DDoS attack
information is not made public by companies (to avoid deterioration of brand value),
researchers often face the problem of the limited information available to design
effective defensive strategies against DDoS attacks.

The current section presents the impact of DDoS attack and the inherent vulnerability
of the internet architecture. Real events of DDoS attack together with their financial
impact on companies are included. Further, the need for designing an efficient DDoS
defense strategy is presented in the research work.
The internet resources and network systems should be readily accessible for genuine users
who aim to use the services at any specific time . Unavailability of internet services
and applications at the required instance is one of the major challenges restricting the spread
of Internet-based services. The unavailability can results to either intentional
causes or accidental causes. The basic internet framework is designed to handle accidental
failures but is not efficient against intentional purposes such as intrusion, malware,
hacking, etc.
The Denial-of-Service (DoS) attack is categorized under intentional failures observed on the
internet, which are caused by malware programmers or intruders. These attackers
deny or compromise the availability of internet resources to genuine or authorized users.

User ratings of New Methods for Detection of DoS and DDoS Attacks



Find similar books
The book New Methods for Detection of DoS and DDoS Attacks can be found in the following categories:

Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.