Distributed Denial of Service attacks: real-world detection and mitigation
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
2020
|
Ausgabe: | First edition |
Links: | https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=6268312 |
Beschreibung: | Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Contents -- Foreword -- About the Authors -- Acknowledgments -- Preface -- Contributors -- 1. Introduction -- 1.1 Performance Testing and Analysis of DDoS Detection Approaches -- 1.2 Deceiving DDoS Detection -- 1.3 DDoS Mitigation -- 1.4 Organization -- 2. What is DDoS? -- 2.1 Definition -- 2.2 Classification -- 2.2.1 Resource Saturation -- 2.2.1.1 System/Device Resources -- 2.2.1.2 Network Bandwidth -- 2.2.2 Exploiting Vulnerability -- 2.2.3 Tampering -- 2.2.4 Misuse -- 2.2.4.1 Fragmentation and Reassembly -- 2.2.4.2 TCP-based -- 2.2.4.3 Low and Slow Attacks -- 2.2.4.4 Filtering -- 2.2.4.5 Others -- 2.2.5 Physical Destruction -- 2.3 Botnet -- 2.3.1 Botnet Architectures -- 2.3.2 Botnet Topologies -- 2.3.2.1 Star -- 2.3.2.2 Multi-server -- 2.3.2.3 Hierarchical -- 2.3.2.4 Random -- 2.3.3 Botnet Resilience and CnC Resolution -- 2.3.3.1 IP Flux -- 2.3.3.2 Domain Flux -- 2.3.3.3 Blind Proxy Redirection -- 2.4 Attack Tools -- 2.4.1 Classification of Attack Tools -- 2.4.2 Popular Attack Tools -- 2.5 Problems -- 2.6 Glossary -- 3. History and Motivation -- 3.1 A Brief History of Computers and Computer Crime -- 3.2 DDoS Tools and Technologies -- 3.2.1 DDoS Bots and Stressers -- 3.2.2 Botnets -- 3.2.3 Worms -- 3.2.4 DNS DDoS -- 3.2.5 BGP Exploits -- 3.3 DDoS History -- 3.3.1 Early DoS -- 3.3.2 Hackers -- 3.3.2.1 L0pht -- 3.3.2.2 Ma aboy -- 3.3.3 Commercial Exploitation -- 3.3.3.1 DDoS for Hire -- 3.3.3.2 Ransomware -- 3.3.4 Censorship -- 3.3.4.1 Myanmar -- 3.3.4.2 Kyrgyzstan -- 3.3.4.3 Kazakh -- 3.3.4.4 Iran -- 3.3.4.5 Vietnam -- 3.3.4.6 Radio Free Europe/Radio Liberty -- 3.3.4.7 Krebs on Security -- 3.3.5 Cyberwar -- 3.3.5.1 Hainan -- 3.3.5.2 Estonia -- 3.3.5.3 Georgia -- 3.3.5.4 Ukraine -- 3.3.5.5 Israel -- 3.3.5.6 US and Korea -- 3.3.6 Hacktivism and/or Terrorism 3.3.6.1 Electronic Disturbance Theater -- 3.3.6.2 Electrohippies -- 3.3.6.3 Lufthansa -- 3.3.6.4 Russian Election -- 3.3.6.5 Chanology -- 3.3.6.6 CNN -- 3.3.6.7 Operations Titstorm and Payback -- 3.3.6.8 Lizard Squad -- 3.3.6.9 Black Lives Matter -- 3.3.6.10 Syrian Electronic Army -- 3.3.6.11 Daesh -- 3.3.7 Internet Blackouts -- 3.4 Conclusions -- 3.5 Problems -- 3.6 Glossary -- 4. Legal Considerations -- 4.1 Introduction -- 4.2 Laws against DDoS -- 4.3 Jurisdiction -- 4.4 DDoS Liability -- 4.5 Protest -- 4.6 Cyberwar -- 4.7 Conclusion -- 4.8 Problems -- 4.9 Glossary -- 5. DDoS Research: Traffic -- 5.1 Dataset -- 5.1.1 Classification -- 5.1.2 Features -- 5.2 Traffic Generation -- 5.2.1 Approaches -- 5.2.2 Tools -- 5.2.2.1 Stress Testing / Attack Traffic Generation Tools -- 5.2.2.2 Background Traffic Generation Tools -- 5.2.2.3 Replay Tools -- 5.3 (D)DoS Benchmark Datasets -- 5.4 Discussion -- 5.5 Problems -- 5.6 Glossary -- 6. DDoS Research: Testing -- 6.1 Network Simulators / Emulators -- 6.1.1 Popular Network Simulators / Emulators -- 6.1.1.1 NS2 -- 6.1.1.2 NS3 -- 6.1.1.3 OMNET++ -- 6.1.1.4 Shadow -- 6.1.1.5 GNS3 -- 6.1.1.6 IMUNES -- 6.1.1.7 CORE -- 6.1.1.8 Mininet -- 6.1.1.9 VNX -- 6.1.1.10 Wistar -- 6.2 Network Testbeds -- 6.2.1 Technologies and Concepts -- 6.2.2 Popular Network Testbeds -- 6.2.2.1 Emulab -- 6.2.2.2 PlanetLab -- 6.2.2.3 GENI -- 6.2.2.4 KREONET -- 6.2.2.5 FIRE -- 6.2.2.6 SAVI -- 6.2.2.7 JGN -- 6.3 Case Study Network Mirroring -- 6.3.1 Experiment Setup -- 6.3.2 Advantages of Experiment Setup -- 6.4 Problems -- 6.5 Glossary -- 7. DDoS Research: Evaluation -- 7.1 Performance Evaluation Metrics -- 7.1.1 Detection Performance -- 7.1.2 Mitigation Performance -- 7.1.3 System Cost -- 7.1.4 Qualitative Evaluation -- 7.2 Discussion -- 7.3 Problems -- 7.4 Glossary -- 8. Attack Detection -- 8.1 Classification of DDoS Detection Algorithms 8.2 An Empirical Study: DDoS Detection Using Operational Network Data -- 8.2.1 Literature -- 8.2.2 Background -- 8.2.2.1 Cumulative Sum (CUSUM) -- 8.2.2.2 Wavelet -- 8.2.2.3 Entropy -- 8.2.3 Performance Testing Using Operational Network Data -- 8.2.3.1 Traffic Volume-based Detection -- 8.2.3.2 Entropy-based Detection -- 8.2.3.3 Comparison and Discussion -- 8.2.4 Cusum-Entropy -- 8.2.4.1 Cusum - Entropy Algorithm -- 8.3 Problems -- 8.4 Glossary -- 9. Deceiving DDoS Detection -- 9.1 A Case Study: Deceiving Entropy-based DDoS Detection Systems -- 9.1.1 Entropy Spoofing -- 9.1.1.1 Controlling Entropy Value -- 9.1.2 Experimental Results -- 9.1.3 Discussion -- 9.2 Problems -- 9.3 Glossary -- 10. Attack Mitigation -- 10.1 Classification -- 10.1.1 Classification-based on Mitigation Time -- 10.1.1.1 Before An Attack (Prevention) -- 10.1.1.2 During An Attack (Detection) -- 10.1.1.3 After An Attack (Reaction / Source Identi cation) -- 10.1.2 Classification-based on Deployment Type -- 10.1.2.1 Centralized -- 10.1.2.2 Distributed -- 10.1.3 Classification-based on Deployment Location -- 10.1.3.1 Source-based -- 10.1.3.2 Destination-based -- 10.1.3.3 Network-based -- 10.1.3.4 Hybrid -- 10.1.4 Classification-based on Reaction Place -- 10.1.4.1 On The Premises -- 10.1.4.2 In The Cloud -- 10.1.5 Classification-based on Reaction Type -- 10.1.5.1 Filtering-based -- 10.1.5.2 Increasing Attack Surface -- 10.1.5.3 Moving Target -- 10.2 Content Delivery Networks -- 10.3 Deflect -- 10.4 DDM: Dynamic DDoS Mitigation System -- 10.4.1 DDM Building Blocks -- 10.4.1.1 Resource Manager -- 10.4.1.2 DNS Module -- 10.4.1.3 Deflect Module -- 10.4.1.4 Data Collection Module -- 10.4.1.5 Decision Module -- 10.4.1.6 DDM Controller -- 10.4.2 DDM Testing -- 10.4.2.1 Attack Scenarios -- 10.4.2.2 Test Results -- 10.4.3 Discussion -- 10.5 DDoS Mitigation Using Game Theory 10.5.1 Distributed Denial of Service Mitigation Approach Traffic Flow -- 10.5.1.1 Player 1 - Blue -- 10.5.1.2 Player 2 - Red -- 10.5.2 Distributed Denial of Service Mitigation Approach - Recon guration Strategies -- 10.5.2.1 Game -- 10.5.2.2 Sum of Games and Thermographs -- 10.6 Economic Denial of Sustainability -- 10.7 Discussion and Comparison -- 10.8 Problems -- 10.9 Glossary -- 11. Security and DDoS in SDN: Opportunities and Challenges -- 11.1 Overview -- 11.2 Fundamentals of SDN -- 11.3 Improving Network Security with SDN -- 11.3.1 Implementing Flexible and Cost-effective Security Functions -- 11.3.2 Deception and Moving Target Defense -- 11.3.3 Securing Protocols against Spoofing -- 11.3.4 Other Opportunities -- 11.4 New Security Threats against SDN -- 11.4.1 Reconnaissance against SDN -- 11.4.2 Taking Advantage of the Widened Attack Surface -- 11.5 DDoS in SDN -- 11.5.1 New DDoS Attacks Threatening SDN -- 11.5.2 Using SDN for Better DDoS Defense -- 11.6 Discussion and Future Trends -- 11.7 Problems -- 11.8 Glossary -- 12. Denial of Service Attack in Control Systems -- 12.1 DoS Attack in Cyber Physical Systems -- 12.2 Modeling DoS Attack From Control Perspective -- 12.3 DoS Attack Estimation and Countermeasure -- 12.3.1 Overview on Observer Design and Diagnostics -- 12.3.2 Adaptive Observer Design -- 12.4 Proposed Algorithm -- 12.5 Case Study and Simulation Results -- 12.6 Problems -- 12.7 Glossary -- 13. Denial of Service Attack on Phasor Measurement Unit -- 13.1 Overview -- 13.2 Background -- 13.2.1 The Synchrophasor Protocol -- 13.2.2 Security Gateways -- 13.2.3 Side-Channel Analysis -- 13.2.3.1 Hidden Markov Models -- 13.2.4 Man-In-The-Middle Attack -- 13.3 Two-Area Four Machine Power System with Utility-Scale PV Plant and PMUs -- 13.3.1 PMU Traffic Separation Algorithm -- 13.3.2 DoS Attack on PMU Measurement Traffic 13.4 AGC Operation Under Attack -- 13.4.1 Experimental Setup -- 13.5 Consequences of DoS Attacks -- 13.5.1 Fault and Attack without Countermeasure -- 13.5.2 Analysis -- 13.6 Summary -- 13.7 Problems -- 13.8 Glossary -- 14. DDoS Lab -- 14.1 Toolbox -- 14.1.1 Wireshark / tshark -- 14.1.2 Scapy -- 14.1.3 JMeter -- 14.1.4 Apache Traffic Server (ATS) -- 14.1.5 Apache HTTP Server -- 14.1.6 BIND Domain Name Server -- 14.1.7 Virtualbox -- 14.1.8 Deflect -- 14.1.9 Distributed DDoS Mitigation Tool (DDM) -- 14.2 Lab Guidelines -- 14.2.1 Data Handling -- 14.2.1.1 Course Background -- 14.2.1.2 Attestation -- 14.2.2 Assignment / Project Report -- 14.2.2.1 Introduction -- 14.2.2.2 Methodology -- 14.2.2.3 Results -- 14.2.2.4 Conclusion -- 14.2.2.5 Comments -- 14.2.2.6 Bibliography -- 14.2.2.7 Appendix -- 14.3 Assignments -- 14.3.1 Attack -- 14.3.1.1 Sniffing Network -- 14.3.1.2 Man in the Middle -- 14.3.1.3 Spoofing -- 14.3.1.4 Network Background Traffic Generation -- 14.3.1.5 DDoS Simulation -- 14.3.1.6 Syn Flood -- 14.3.1.7 Bandwidth Starvation Attack -- 14.3.1.8 Amplification / Reflection -- 14.3.1.9 HTTP GET / POST -- 14.3.2 Detection -- 14.3.2.1 Thresholding -- 14.3.2.2 Cusum -- 14.3.2.3 Cusum - Wavelet -- 14.3.2.4 Wavelet - Cusum -- 14.3.2.5 Entropy -- 14.3.2.6 Questions -- 14.3.3 Deception -- 14.3.4 Mitigation -- 15. Conclusion -- 15.1 Analysis and Conclusions -- 15.2 Suggestions for Future Research -- 15.3 Final Words -- 16. Appendix -- 16.1 Generate TCP Traffic with Ostinato -- 16.2 Mininet Quick Guide -- 16.2.1 Mininet Quick Hands-On -- 16.2.1.1 Install Mininet -- 16.2.1.2 Access Mininet VM -- 16.2.1.3 Start and Stop Mininet -- 16.2.2 Mininet Lab Guide -- 16.2.2.1 Create a Topology -- 16.2.2.2 Run Applications on the Network -- 16.3 NS2 DDoS Simulation -- 16.3.1 Explanation of Script "attack.tcl -- 16.3.1.1 Key Concepts 16.3.1.2 Explanation of the Script |
Umfang: | 1 Online-Ressource Illustrationen |
ISBN: | 9781351817646 9781315213125 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV047017293 | ||
003 | DE-604 | ||
005 | 20230728 | ||
007 | cr|uuu---uuuuu | ||
008 | 201119s2020 xx a||| o|||| 00||| eng d | ||
020 | |a 9781351817646 |9 978-1-351-81764-6 | ||
020 | |a 9781315213125 |9 978-1-315-21312-5 | ||
035 | |a (ZDB-30-PQE)EBC6268312 | ||
035 | |a (OCoLC)1224015324 | ||
035 | |a (DE-599)BVBBV047017293 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 | ||
084 | |a DAT 461 |2 stub | ||
084 | |a DAT 055 |2 stub | ||
100 | 1 | |a Brooks, Richard R. |e Verfasser |0 (DE-588)1054381550 |4 aut | |
245 | 1 | 0 | |a Distributed Denial of Service attacks |b real-world detection and mitigation |c Richard R. Brooks, İlker Özçelik |
250 | |a First edition | ||
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press |c 2020 | |
300 | |a 1 Online-Ressource |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Contents -- Foreword -- About the Authors -- Acknowledgments -- Preface -- Contributors -- 1. Introduction -- 1.1 Performance Testing and Analysis of DDoS Detection Approaches -- 1.2 Deceiving DDoS Detection -- 1.3 DDoS Mitigation -- 1.4 Organization -- 2. What is DDoS? -- 2.1 Definition -- 2.2 Classification -- 2.2.1 Resource Saturation -- 2.2.1.1 System/Device Resources -- 2.2.1.2 Network Bandwidth -- 2.2.2 Exploiting Vulnerability -- 2.2.3 Tampering -- 2.2.4 Misuse -- 2.2.4.1 Fragmentation and Reassembly -- 2.2.4.2 TCP-based -- 2.2.4.3 Low and Slow Attacks -- 2.2.4.4 Filtering -- 2.2.4.5 Others -- 2.2.5 Physical Destruction -- 2.3 Botnet -- 2.3.1 Botnet Architectures -- 2.3.2 Botnet Topologies -- 2.3.2.1 Star -- 2.3.2.2 Multi-server -- 2.3.2.3 Hierarchical -- 2.3.2.4 Random -- 2.3.3 Botnet Resilience and CnC Resolution -- 2.3.3.1 IP Flux -- 2.3.3.2 Domain Flux -- 2.3.3.3 Blind Proxy Redirection -- 2.4 Attack Tools -- 2.4.1 Classification of Attack Tools -- 2.4.2 Popular Attack Tools -- 2.5 Problems -- 2.6 Glossary -- 3. History and Motivation -- 3.1 A Brief History of Computers and Computer Crime -- 3.2 DDoS Tools and Technologies -- 3.2.1 DDoS Bots and Stressers -- 3.2.2 Botnets -- 3.2.3 Worms -- 3.2.4 DNS DDoS -- 3.2.5 BGP Exploits -- 3.3 DDoS History -- 3.3.1 Early DoS -- 3.3.2 Hackers -- 3.3.2.1 L0pht -- 3.3.2.2 Ma aboy -- 3.3.3 Commercial Exploitation -- 3.3.3.1 DDoS for Hire -- 3.3.3.2 Ransomware -- 3.3.4 Censorship -- 3.3.4.1 Myanmar -- 3.3.4.2 Kyrgyzstan -- 3.3.4.3 Kazakh -- 3.3.4.4 Iran -- 3.3.4.5 Vietnam -- 3.3.4.6 Radio Free Europe/Radio Liberty -- 3.3.4.7 Krebs on Security -- 3.3.5 Cyberwar -- 3.3.5.1 Hainan -- 3.3.5.2 Estonia -- 3.3.5.3 Georgia -- 3.3.5.4 Ukraine -- 3.3.5.5 Israel -- 3.3.5.6 US and Korea -- 3.3.6 Hacktivism and/or Terrorism | ||
500 | |a 3.3.6.1 Electronic Disturbance Theater -- 3.3.6.2 Electrohippies -- 3.3.6.3 Lufthansa -- 3.3.6.4 Russian Election -- 3.3.6.5 Chanology -- 3.3.6.6 CNN -- 3.3.6.7 Operations Titstorm and Payback -- 3.3.6.8 Lizard Squad -- 3.3.6.9 Black Lives Matter -- 3.3.6.10 Syrian Electronic Army -- 3.3.6.11 Daesh -- 3.3.7 Internet Blackouts -- 3.4 Conclusions -- 3.5 Problems -- 3.6 Glossary -- 4. Legal Considerations -- 4.1 Introduction -- 4.2 Laws against DDoS -- 4.3 Jurisdiction -- 4.4 DDoS Liability -- 4.5 Protest -- 4.6 Cyberwar -- 4.7 Conclusion -- 4.8 Problems -- 4.9 Glossary -- 5. DDoS Research: Traffic -- 5.1 Dataset -- 5.1.1 Classification -- 5.1.2 Features -- 5.2 Traffic Generation -- 5.2.1 Approaches -- 5.2.2 Tools -- 5.2.2.1 Stress Testing / Attack Traffic Generation Tools -- 5.2.2.2 Background Traffic Generation Tools -- 5.2.2.3 Replay Tools -- 5.3 (D)DoS Benchmark Datasets -- 5.4 Discussion -- 5.5 Problems -- 5.6 Glossary -- 6. DDoS Research: Testing -- 6.1 Network Simulators / Emulators -- 6.1.1 Popular Network Simulators / Emulators -- 6.1.1.1 NS2 -- 6.1.1.2 NS3 -- 6.1.1.3 OMNET++ -- 6.1.1.4 Shadow -- 6.1.1.5 GNS3 -- 6.1.1.6 IMUNES -- 6.1.1.7 CORE -- 6.1.1.8 Mininet -- 6.1.1.9 VNX -- 6.1.1.10 Wistar -- 6.2 Network Testbeds -- 6.2.1 Technologies and Concepts -- 6.2.2 Popular Network Testbeds -- 6.2.2.1 Emulab -- 6.2.2.2 PlanetLab -- 6.2.2.3 GENI -- 6.2.2.4 KREONET -- 6.2.2.5 FIRE -- 6.2.2.6 SAVI -- 6.2.2.7 JGN -- 6.3 Case Study Network Mirroring -- 6.3.1 Experiment Setup -- 6.3.2 Advantages of Experiment Setup -- 6.4 Problems -- 6.5 Glossary -- 7. DDoS Research: Evaluation -- 7.1 Performance Evaluation Metrics -- 7.1.1 Detection Performance -- 7.1.2 Mitigation Performance -- 7.1.3 System Cost -- 7.1.4 Qualitative Evaluation -- 7.2 Discussion -- 7.3 Problems -- 7.4 Glossary -- 8. Attack Detection -- 8.1 Classification of DDoS Detection Algorithms | ||
500 | |a 8.2 An Empirical Study: DDoS Detection Using Operational Network Data -- 8.2.1 Literature -- 8.2.2 Background -- 8.2.2.1 Cumulative Sum (CUSUM) -- 8.2.2.2 Wavelet -- 8.2.2.3 Entropy -- 8.2.3 Performance Testing Using Operational Network Data -- 8.2.3.1 Traffic Volume-based Detection -- 8.2.3.2 Entropy-based Detection -- 8.2.3.3 Comparison and Discussion -- 8.2.4 Cusum-Entropy -- 8.2.4.1 Cusum - Entropy Algorithm -- 8.3 Problems -- 8.4 Glossary -- 9. Deceiving DDoS Detection -- 9.1 A Case Study: Deceiving Entropy-based DDoS Detection Systems -- 9.1.1 Entropy Spoofing -- 9.1.1.1 Controlling Entropy Value -- 9.1.2 Experimental Results -- 9.1.3 Discussion -- 9.2 Problems -- 9.3 Glossary -- 10. Attack Mitigation -- 10.1 Classification -- 10.1.1 Classification-based on Mitigation Time -- 10.1.1.1 Before An Attack (Prevention) -- 10.1.1.2 During An Attack (Detection) -- 10.1.1.3 After An Attack (Reaction / Source Identi cation) -- 10.1.2 Classification-based on Deployment Type -- 10.1.2.1 Centralized -- 10.1.2.2 Distributed -- 10.1.3 Classification-based on Deployment Location -- 10.1.3.1 Source-based -- 10.1.3.2 Destination-based -- 10.1.3.3 Network-based -- 10.1.3.4 Hybrid -- 10.1.4 Classification-based on Reaction Place -- 10.1.4.1 On The Premises -- 10.1.4.2 In The Cloud -- 10.1.5 Classification-based on Reaction Type -- 10.1.5.1 Filtering-based -- 10.1.5.2 Increasing Attack Surface -- 10.1.5.3 Moving Target -- 10.2 Content Delivery Networks -- 10.3 Deflect -- 10.4 DDM: Dynamic DDoS Mitigation System -- 10.4.1 DDM Building Blocks -- 10.4.1.1 Resource Manager -- 10.4.1.2 DNS Module -- 10.4.1.3 Deflect Module -- 10.4.1.4 Data Collection Module -- 10.4.1.5 Decision Module -- 10.4.1.6 DDM Controller -- 10.4.2 DDM Testing -- 10.4.2.1 Attack Scenarios -- 10.4.2.2 Test Results -- 10.4.3 Discussion -- 10.5 DDoS Mitigation Using Game Theory | ||
500 | |a 10.5.1 Distributed Denial of Service Mitigation Approach Traffic Flow -- 10.5.1.1 Player 1 - Blue -- 10.5.1.2 Player 2 - Red -- 10.5.2 Distributed Denial of Service Mitigation Approach - Recon guration Strategies -- 10.5.2.1 Game -- 10.5.2.2 Sum of Games and Thermographs -- 10.6 Economic Denial of Sustainability -- 10.7 Discussion and Comparison -- 10.8 Problems -- 10.9 Glossary -- 11. Security and DDoS in SDN: Opportunities and Challenges -- 11.1 Overview -- 11.2 Fundamentals of SDN -- 11.3 Improving Network Security with SDN -- 11.3.1 Implementing Flexible and Cost-effective Security Functions -- 11.3.2 Deception and Moving Target Defense -- 11.3.3 Securing Protocols against Spoofing -- 11.3.4 Other Opportunities -- 11.4 New Security Threats against SDN -- 11.4.1 Reconnaissance against SDN -- 11.4.2 Taking Advantage of the Widened Attack Surface -- 11.5 DDoS in SDN -- 11.5.1 New DDoS Attacks Threatening SDN -- 11.5.2 Using SDN for Better DDoS Defense -- 11.6 Discussion and Future Trends -- 11.7 Problems -- 11.8 Glossary -- 12. Denial of Service Attack in Control Systems -- 12.1 DoS Attack in Cyber Physical Systems -- 12.2 Modeling DoS Attack From Control Perspective -- 12.3 DoS Attack Estimation and Countermeasure -- 12.3.1 Overview on Observer Design and Diagnostics -- 12.3.2 Adaptive Observer Design -- 12.4 Proposed Algorithm -- 12.5 Case Study and Simulation Results -- 12.6 Problems -- 12.7 Glossary -- 13. Denial of Service Attack on Phasor Measurement Unit -- 13.1 Overview -- 13.2 Background -- 13.2.1 The Synchrophasor Protocol -- 13.2.2 Security Gateways -- 13.2.3 Side-Channel Analysis -- 13.2.3.1 Hidden Markov Models -- 13.2.4 Man-In-The-Middle Attack -- 13.3 Two-Area Four Machine Power System with Utility-Scale PV Plant and PMUs -- 13.3.1 PMU Traffic Separation Algorithm -- 13.3.2 DoS Attack on PMU Measurement Traffic | ||
500 | |a 13.4 AGC Operation Under Attack -- 13.4.1 Experimental Setup -- 13.5 Consequences of DoS Attacks -- 13.5.1 Fault and Attack without Countermeasure -- 13.5.2 Analysis -- 13.6 Summary -- 13.7 Problems -- 13.8 Glossary -- 14. DDoS Lab -- 14.1 Toolbox -- 14.1.1 Wireshark / tshark -- 14.1.2 Scapy -- 14.1.3 JMeter -- 14.1.4 Apache Traffic Server (ATS) -- 14.1.5 Apache HTTP Server -- 14.1.6 BIND Domain Name Server -- 14.1.7 Virtualbox -- 14.1.8 Deflect -- 14.1.9 Distributed DDoS Mitigation Tool (DDM) -- 14.2 Lab Guidelines -- 14.2.1 Data Handling -- 14.2.1.1 Course Background -- 14.2.1.2 Attestation -- 14.2.2 Assignment / Project Report -- 14.2.2.1 Introduction -- 14.2.2.2 Methodology -- 14.2.2.3 Results -- 14.2.2.4 Conclusion -- 14.2.2.5 Comments -- 14.2.2.6 Bibliography -- 14.2.2.7 Appendix -- 14.3 Assignments -- 14.3.1 Attack -- 14.3.1.1 Sniffing Network -- 14.3.1.2 Man in the Middle -- 14.3.1.3 Spoofing -- 14.3.1.4 Network Background Traffic Generation -- 14.3.1.5 DDoS Simulation -- 14.3.1.6 Syn Flood -- 14.3.1.7 Bandwidth Starvation Attack -- 14.3.1.8 Amplification / Reflection -- 14.3.1.9 HTTP GET / POST -- 14.3.2 Detection -- 14.3.2.1 Thresholding -- 14.3.2.2 Cusum -- 14.3.2.3 Cusum - Wavelet -- 14.3.2.4 Wavelet - Cusum -- 14.3.2.5 Entropy -- 14.3.2.6 Questions -- 14.3.3 Deception -- 14.3.4 Mitigation -- 15. Conclusion -- 15.1 Analysis and Conclusions -- 15.2 Suggestions for Future Research -- 15.3 Final Words -- 16. Appendix -- 16.1 Generate TCP Traffic with Ostinato -- 16.2 Mininet Quick Guide -- 16.2.1 Mininet Quick Hands-On -- 16.2.1.1 Install Mininet -- 16.2.1.2 Access Mininet VM -- 16.2.1.3 Start and Stop Mininet -- 16.2.2 Mininet Lab Guide -- 16.2.2.1 Create a Topology -- 16.2.2.2 Run Applications on the Network -- 16.3 NS2 DDoS Simulation -- 16.3.1 Explanation of Script "attack.tcl -- 16.3.1.1 Key Concepts | ||
500 | |a 16.3.1.2 Explanation of the Script | ||
700 | 1 | |a Özçelik, İlker |e Verfasser |0 (DE-588)1222932938 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-0-367-49154-3 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-1-138-62681-2 |
912 | |a ZDB-30-PQE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032424828 | |
966 | e | |u https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=6268312 |l DE-91 |p ZDB-30-PQE |q TUM_PDA_PQE_Kauf |x Aggregator |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2509216 |
---|---|
_version_ | 1821936103784972289 |
any_adam_object | |
author | Brooks, Richard R. Özçelik, İlker |
author_GND | (DE-588)1054381550 (DE-588)1222932938 |
author_facet | Brooks, Richard R. Özçelik, İlker |
author_role | aut aut |
author_sort | Brooks, Richard R. |
author_variant | r r b rr rrb i ö iö |
building | Verbundindex |
bvnumber | BV047017293 |
classification_tum | DAT 461 DAT 055 |
collection | ZDB-30-PQE |
ctrlnum | (ZDB-30-PQE)EBC6268312 (OCoLC)1224015324 (DE-599)BVBBV047017293 |
discipline | Informatik |
edition | First edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>10852nam a2200445zc 4500</leader><controlfield tag="001">BV047017293</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230728 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201119s2020 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781351817646</subfield><subfield code="9">978-1-351-81764-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781315213125</subfield><subfield code="9">978-1-315-21312-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC6268312</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1224015324</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047017293</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Brooks, Richard R.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1054381550</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Distributed Denial of Service attacks</subfield><subfield code="b">real-world detection and mitigation</subfield><subfield code="c">Richard R. Brooks, İlker Özçelik</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Contents -- Foreword -- About the Authors -- Acknowledgments -- Preface -- Contributors -- 1. Introduction -- 1.1 Performance Testing and Analysis of DDoS Detection Approaches -- 1.2 Deceiving DDoS Detection -- 1.3 DDoS Mitigation -- 1.4 Organization -- 2. What is DDoS? -- 2.1 Definition -- 2.2 Classification -- 2.2.1 Resource Saturation -- 2.2.1.1 System/Device Resources -- 2.2.1.2 Network Bandwidth -- 2.2.2 Exploiting Vulnerability -- 2.2.3 Tampering -- 2.2.4 Misuse -- 2.2.4.1 Fragmentation and Reassembly -- 2.2.4.2 TCP-based -- 2.2.4.3 Low and Slow Attacks -- 2.2.4.4 Filtering -- 2.2.4.5 Others -- 2.2.5 Physical Destruction -- 2.3 Botnet -- 2.3.1 Botnet Architectures -- 2.3.2 Botnet Topologies -- 2.3.2.1 Star -- 2.3.2.2 Multi-server -- 2.3.2.3 Hierarchical -- 2.3.2.4 Random -- 2.3.3 Botnet Resilience and CnC Resolution -- 2.3.3.1 IP Flux -- 2.3.3.2 Domain Flux -- 2.3.3.3 Blind Proxy Redirection -- 2.4 Attack Tools -- 2.4.1 Classification of Attack Tools -- 2.4.2 Popular Attack Tools -- 2.5 Problems -- 2.6 Glossary -- 3. History and Motivation -- 3.1 A Brief History of Computers and Computer Crime -- 3.2 DDoS Tools and Technologies -- 3.2.1 DDoS Bots and Stressers -- 3.2.2 Botnets -- 3.2.3 Worms -- 3.2.4 DNS DDoS -- 3.2.5 BGP Exploits -- 3.3 DDoS History -- 3.3.1 Early DoS -- 3.3.2 Hackers -- 3.3.2.1 L0pht -- 3.3.2.2 Ma aboy -- 3.3.3 Commercial Exploitation -- 3.3.3.1 DDoS for Hire -- 3.3.3.2 Ransomware -- 3.3.4 Censorship -- 3.3.4.1 Myanmar -- 3.3.4.2 Kyrgyzstan -- 3.3.4.3 Kazakh -- 3.3.4.4 Iran -- 3.3.4.5 Vietnam -- 3.3.4.6 Radio Free Europe/Radio Liberty -- 3.3.4.7 Krebs on Security -- 3.3.5 Cyberwar -- 3.3.5.1 Hainan -- 3.3.5.2 Estonia -- 3.3.5.3 Georgia -- 3.3.5.4 Ukraine -- 3.3.5.5 Israel -- 3.3.5.6 US and Korea -- 3.3.6 Hacktivism and/or Terrorism</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">3.3.6.1 Electronic Disturbance Theater -- 3.3.6.2 Electrohippies -- 3.3.6.3 Lufthansa -- 3.3.6.4 Russian Election -- 3.3.6.5 Chanology -- 3.3.6.6 CNN -- 3.3.6.7 Operations Titstorm and Payback -- 3.3.6.8 Lizard Squad -- 3.3.6.9 Black Lives Matter -- 3.3.6.10 Syrian Electronic Army -- 3.3.6.11 Daesh -- 3.3.7 Internet Blackouts -- 3.4 Conclusions -- 3.5 Problems -- 3.6 Glossary -- 4. Legal Considerations -- 4.1 Introduction -- 4.2 Laws against DDoS -- 4.3 Jurisdiction -- 4.4 DDoS Liability -- 4.5 Protest -- 4.6 Cyberwar -- 4.7 Conclusion -- 4.8 Problems -- 4.9 Glossary -- 5. DDoS Research: Traffic -- 5.1 Dataset -- 5.1.1 Classification -- 5.1.2 Features -- 5.2 Traffic Generation -- 5.2.1 Approaches -- 5.2.2 Tools -- 5.2.2.1 Stress Testing / Attack Traffic Generation Tools -- 5.2.2.2 Background Traffic Generation Tools -- 5.2.2.3 Replay Tools -- 5.3 (D)DoS Benchmark Datasets -- 5.4 Discussion -- 5.5 Problems -- 5.6 Glossary -- 6. DDoS Research: Testing -- 6.1 Network Simulators / Emulators -- 6.1.1 Popular Network Simulators / Emulators -- 6.1.1.1 NS2 -- 6.1.1.2 NS3 -- 6.1.1.3 OMNET++ -- 6.1.1.4 Shadow -- 6.1.1.5 GNS3 -- 6.1.1.6 IMUNES -- 6.1.1.7 CORE -- 6.1.1.8 Mininet -- 6.1.1.9 VNX -- 6.1.1.10 Wistar -- 6.2 Network Testbeds -- 6.2.1 Technologies and Concepts -- 6.2.2 Popular Network Testbeds -- 6.2.2.1 Emulab -- 6.2.2.2 PlanetLab -- 6.2.2.3 GENI -- 6.2.2.4 KREONET -- 6.2.2.5 FIRE -- 6.2.2.6 SAVI -- 6.2.2.7 JGN -- 6.3 Case Study Network Mirroring -- 6.3.1 Experiment Setup -- 6.3.2 Advantages of Experiment Setup -- 6.4 Problems -- 6.5 Glossary -- 7. DDoS Research: Evaluation -- 7.1 Performance Evaluation Metrics -- 7.1.1 Detection Performance -- 7.1.2 Mitigation Performance -- 7.1.3 System Cost -- 7.1.4 Qualitative Evaluation -- 7.2 Discussion -- 7.3 Problems -- 7.4 Glossary -- 8. Attack Detection -- 8.1 Classification of DDoS Detection Algorithms</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">8.2 An Empirical Study: DDoS Detection Using Operational Network Data -- 8.2.1 Literature -- 8.2.2 Background -- 8.2.2.1 Cumulative Sum (CUSUM) -- 8.2.2.2 Wavelet -- 8.2.2.3 Entropy -- 8.2.3 Performance Testing Using Operational Network Data -- 8.2.3.1 Traffic Volume-based Detection -- 8.2.3.2 Entropy-based Detection -- 8.2.3.3 Comparison and Discussion -- 8.2.4 Cusum-Entropy -- 8.2.4.1 Cusum - Entropy Algorithm -- 8.3 Problems -- 8.4 Glossary -- 9. Deceiving DDoS Detection -- 9.1 A Case Study: Deceiving Entropy-based DDoS Detection Systems -- 9.1.1 Entropy Spoofing -- 9.1.1.1 Controlling Entropy Value -- 9.1.2 Experimental Results -- 9.1.3 Discussion -- 9.2 Problems -- 9.3 Glossary -- 10. Attack Mitigation -- 10.1 Classification -- 10.1.1 Classification-based on Mitigation Time -- 10.1.1.1 Before An Attack (Prevention) -- 10.1.1.2 During An Attack (Detection) -- 10.1.1.3 After An Attack (Reaction / Source Identi cation) -- 10.1.2 Classification-based on Deployment Type -- 10.1.2.1 Centralized -- 10.1.2.2 Distributed -- 10.1.3 Classification-based on Deployment Location -- 10.1.3.1 Source-based -- 10.1.3.2 Destination-based -- 10.1.3.3 Network-based -- 10.1.3.4 Hybrid -- 10.1.4 Classification-based on Reaction Place -- 10.1.4.1 On The Premises -- 10.1.4.2 In The Cloud -- 10.1.5 Classification-based on Reaction Type -- 10.1.5.1 Filtering-based -- 10.1.5.2 Increasing Attack Surface -- 10.1.5.3 Moving Target -- 10.2 Content Delivery Networks -- 10.3 Deflect -- 10.4 DDM: Dynamic DDoS Mitigation System -- 10.4.1 DDM Building Blocks -- 10.4.1.1 Resource Manager -- 10.4.1.2 DNS Module -- 10.4.1.3 Deflect Module -- 10.4.1.4 Data Collection Module -- 10.4.1.5 Decision Module -- 10.4.1.6 DDM Controller -- 10.4.2 DDM Testing -- 10.4.2.1 Attack Scenarios -- 10.4.2.2 Test Results -- 10.4.3 Discussion -- 10.5 DDoS Mitigation Using Game Theory</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">10.5.1 Distributed Denial of Service Mitigation Approach Traffic Flow -- 10.5.1.1 Player 1 - Blue -- 10.5.1.2 Player 2 - Red -- 10.5.2 Distributed Denial of Service Mitigation Approach - Recon guration Strategies -- 10.5.2.1 Game -- 10.5.2.2 Sum of Games and Thermographs -- 10.6 Economic Denial of Sustainability -- 10.7 Discussion and Comparison -- 10.8 Problems -- 10.9 Glossary -- 11. Security and DDoS in SDN: Opportunities and Challenges -- 11.1 Overview -- 11.2 Fundamentals of SDN -- 11.3 Improving Network Security with SDN -- 11.3.1 Implementing Flexible and Cost-effective Security Functions -- 11.3.2 Deception and Moving Target Defense -- 11.3.3 Securing Protocols against Spoofing -- 11.3.4 Other Opportunities -- 11.4 New Security Threats against SDN -- 11.4.1 Reconnaissance against SDN -- 11.4.2 Taking Advantage of the Widened Attack Surface -- 11.5 DDoS in SDN -- 11.5.1 New DDoS Attacks Threatening SDN -- 11.5.2 Using SDN for Better DDoS Defense -- 11.6 Discussion and Future Trends -- 11.7 Problems -- 11.8 Glossary -- 12. Denial of Service Attack in Control Systems -- 12.1 DoS Attack in Cyber Physical Systems -- 12.2 Modeling DoS Attack From Control Perspective -- 12.3 DoS Attack Estimation and Countermeasure -- 12.3.1 Overview on Observer Design and Diagnostics -- 12.3.2 Adaptive Observer Design -- 12.4 Proposed Algorithm -- 12.5 Case Study and Simulation Results -- 12.6 Problems -- 12.7 Glossary -- 13. Denial of Service Attack on Phasor Measurement Unit -- 13.1 Overview -- 13.2 Background -- 13.2.1 The Synchrophasor Protocol -- 13.2.2 Security Gateways -- 13.2.3 Side-Channel Analysis -- 13.2.3.1 Hidden Markov Models -- 13.2.4 Man-In-The-Middle Attack -- 13.3 Two-Area Four Machine Power System with Utility-Scale PV Plant and PMUs -- 13.3.1 PMU Traffic Separation Algorithm -- 13.3.2 DoS Attack on PMU Measurement Traffic</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">13.4 AGC Operation Under Attack -- 13.4.1 Experimental Setup -- 13.5 Consequences of DoS Attacks -- 13.5.1 Fault and Attack without Countermeasure -- 13.5.2 Analysis -- 13.6 Summary -- 13.7 Problems -- 13.8 Glossary -- 14. DDoS Lab -- 14.1 Toolbox -- 14.1.1 Wireshark / tshark -- 14.1.2 Scapy -- 14.1.3 JMeter -- 14.1.4 Apache Traffic Server (ATS) -- 14.1.5 Apache HTTP Server -- 14.1.6 BIND Domain Name Server -- 14.1.7 Virtualbox -- 14.1.8 Deflect -- 14.1.9 Distributed DDoS Mitigation Tool (DDM) -- 14.2 Lab Guidelines -- 14.2.1 Data Handling -- 14.2.1.1 Course Background -- 14.2.1.2 Attestation -- 14.2.2 Assignment / Project Report -- 14.2.2.1 Introduction -- 14.2.2.2 Methodology -- 14.2.2.3 Results -- 14.2.2.4 Conclusion -- 14.2.2.5 Comments -- 14.2.2.6 Bibliography -- 14.2.2.7 Appendix -- 14.3 Assignments -- 14.3.1 Attack -- 14.3.1.1 Sniffing Network -- 14.3.1.2 Man in the Middle -- 14.3.1.3 Spoofing -- 14.3.1.4 Network Background Traffic Generation -- 14.3.1.5 DDoS Simulation -- 14.3.1.6 Syn Flood -- 14.3.1.7 Bandwidth Starvation Attack -- 14.3.1.8 Amplification / Reflection -- 14.3.1.9 HTTP GET / POST -- 14.3.2 Detection -- 14.3.2.1 Thresholding -- 14.3.2.2 Cusum -- 14.3.2.3 Cusum - Wavelet -- 14.3.2.4 Wavelet - Cusum -- 14.3.2.5 Entropy -- 14.3.2.6 Questions -- 14.3.3 Deception -- 14.3.4 Mitigation -- 15. Conclusion -- 15.1 Analysis and Conclusions -- 15.2 Suggestions for Future Research -- 15.3 Final Words -- 16. Appendix -- 16.1 Generate TCP Traffic with Ostinato -- 16.2 Mininet Quick Guide -- 16.2.1 Mininet Quick Hands-On -- 16.2.1.1 Install Mininet -- 16.2.1.2 Access Mininet VM -- 16.2.1.3 Start and Stop Mininet -- 16.2.2 Mininet Lab Guide -- 16.2.2.1 Create a Topology -- 16.2.2.2 Run Applications on the Network -- 16.3 NS2 DDoS Simulation -- 16.3.1 Explanation of Script "attack.tcl -- 16.3.1.1 Key Concepts</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">16.3.1.2 Explanation of the Script</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Özçelik, İlker</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1222932938</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-0-367-49154-3</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-1-138-62681-2</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032424828</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=6268312</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">TUM_PDA_PQE_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047017293 |
illustrated | Illustrated |
indexdate | 2024-12-20T19:07:25Z |
institution | BVB |
isbn | 9781351817646 9781315213125 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032424828 |
oclc_num | 1224015324 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource Illustrationen |
psigel | ZDB-30-PQE ZDB-30-PQE TUM_PDA_PQE_Kauf |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | CRC Press |
record_format | marc |
spellingShingle | Brooks, Richard R. Özçelik, İlker Distributed Denial of Service attacks real-world detection and mitigation |
title | Distributed Denial of Service attacks real-world detection and mitigation |
title_auth | Distributed Denial of Service attacks real-world detection and mitigation |
title_exact_search | Distributed Denial of Service attacks real-world detection and mitigation |
title_full | Distributed Denial of Service attacks real-world detection and mitigation Richard R. Brooks, İlker Özçelik |
title_fullStr | Distributed Denial of Service attacks real-world detection and mitigation Richard R. Brooks, İlker Özçelik |
title_full_unstemmed | Distributed Denial of Service attacks real-world detection and mitigation Richard R. Brooks, İlker Özçelik |
title_short | Distributed Denial of Service attacks |
title_sort | distributed denial of service attacks real world detection and mitigation |
title_sub | real-world detection and mitigation |
work_keys_str_mv | AT brooksrichardr distributeddenialofserviceattacksrealworlddetectionandmitigation AT ozcelikilker distributeddenialofserviceattacksrealworlddetectionandmitigation |