
Internet Denial of Service
Attack and Defense Mechanisms
Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher - Collection The Radia Perlman Series in Computer Networking and Security
Résumé
Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do?
Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack.
Inside, you'll find comprehensive information on the following topics
- How denial-of-service attacks are waged
- How to improve your network's resilience to denial-of-service attacks
- What to do when you are involved in a denial-of-service attack
- The laws that apply to these attacks and their implications
- How often denial-of-service attacks occur, how strong they are, and the kinds of damage they can cause
- Real examples of denial-of-service attacks as experienced by the attacker, victim, and unwitting accomplices
The authors' extensive experience in handling denial-of-service attacks and researching defense approaches is laid out clearly in practical, detailed terms.
L'auteur - Jelena Mirkovic
Jelena Mirkovic has been an assistant professor at the University of Delaware since 2003. She holds a Ph.D. in computer science from the University of California, Los Angeles, where she developed effective defenses against distributed denial-of-service attacks
L'auteur - Sven Dietrich
Sven Dietrich is a member of the technical staff at the CERT Coordination Center, part of the Software Engineering Institute at Carnegie Mellon University, and is affiliated with Carnegie Mellon CyLab, a university-wide cyber security research and education initiative. He has worked and published on DDoS since 1999.
L'auteur - David Dittrich
David Dittrich is a senior security engineer at the University of Washington's Center for Information Assurance and Cybersecurity and a founding member of the Honeynet Project. He published the first detailed technical analyses of DDoS tools in 1999, and maintains the largest Web page on the subject.
L'auteur - Peter Reiher
Peter Reiher is an adjunct associate professor at the University of California, Los Angeles. His research includes defenses against denial-of-service attacks.
Sommaire
- Introduction
- Understanding Denial of Service
- History of DoS and DDoS
- How Attacks Are Waged
- An Overview of DDoS Defenses
- Detailed Defense Approaches
- Survey of Research Defense Approaches
- Legal Issues
- Conclusions
- Appendix A: Glossary
- Appendix B: Survey of Commercial Defense Approaches
- Appendix C: DDoS Data
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Prentice Hall |
Auteur(s) | Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher |
Collection | The Radia Perlman Series in Computer Networking and Security |
Parution | 01/02/2005 |
Nb. de pages | 372 |
Format | 17,5 x 23,5 |
Couverture | Broché |
Poids | 761g |
Intérieur | Noir et Blanc |
EAN13 | 9780131475731 |
ISBN13 | 978-0-13-147573-1 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet