Skip to content

Internet Denial of Service Attack and Defense Mechanisms

Spend $50 to get a free DVD!

ISBN-10: 0131475738

ISBN-13: 9780131475731

Edition: 2005

Authors: Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher

List price: $44.99
Blue ribbon 30 day, 100% satisfaction guarantee!
Out of stock
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!


On the Internet, a distributed denial-of-service (DDoS) attack is one in which amultitude of compromised systems attack a single target, thereby causing denialof service for users of the targeted system. The flood of incoming messages tothe target system essentially forces it to shut down, thereby denying service tothe system to legitimate users.The FBI's latest survey of cyber crime lists denial of service as the second mostcostly form of cyber attack, only slightly trailing theft of proprietaryinformation. This book offers an in-depth examination of this increasinglypopular form of network-based attacks by providing a thorough description ofthe scope of the problem, both actual and…    
Customers also bought

Book details

List price: $44.99
Copyright year: 2005
Publisher: Prentice Hall PTR
Publication date: 12/30/2004
Binding: Paperback
Pages: 400
Size: 7.00" wide x 9.00" long x 1.25" tall
Weight: 1.628
Language: English

About the Authors
DoS and DdoS
Why Should We Care?
What Is This Book?
Who Is This Book For?
What Can This Book Help You Do?
Outline of the Remaining
Understanding Denial of Service
The Ulterior Motive
Meet the Attackers
Behind the Scenes
Distribution Effects
DDoS: Hype or Reality?
How Vulnerable Are You to DDoS?
History of DoS and DDoS
Design Principles of the Internet
DoS and DDoS Evolution
How Attacks Are Waged
Recruitment of the Agent Network
Controlling the DDoS Agent Network
Semantic Levels of DDoS Attacks
Attack Toolkits
What Is IP Spoofing?
DDoS Attack Trends
An Overview of DDoS Defenses
Why DDoS Is a Hard Problem
DDoS Defense Challenges
Prevention versus Protection and Reaction
DDoS Defense Goals
DDoS Defense Locations
Defense Approaches
Detailed Defense Approaches
Thinking about Defenses
General Strategy for DDoS Defense
Preparing to Handle a DDoS Attack
Handling an Ongoing DDoS Attack as a Target
Handling an Ongoing DDoS Attack as a Source
Agreements/Understandings with Your ISP
Analyzing DDoS tools
Survey of Research Defense Approaches
Secure Overlay Services (SOS)
Proof of Work
SIFF: An End-Host Capability Mechanism to Mitigate DDoS Flooding Attacks
Hop-Count Filtering (HCF)
Locality and Entropy Principles
An Empirical Analysis of Target-Resident DoS Filters
Research Prognosis
Legal Issues
Basics of the U.S. Legal System
Laws That May Apply to DDoS Attacks
Who Are the Victims of DDoS?
How Often Is Legal Assistance Sought in DDoS Cases?
Initiating Legal Proceedings as a Victim of DdoS
Evidence Collection and Incident Response Procedures
Estimating Damages
Jurisdictional Issues
Domestic Legal Issues
International Legal Issues
Self-Help Options
A Few Words on Ethics
Current Trends in International Cyber Law
Prognosis for DdoS
Social, Moral, and Legal Issues
Resources for Learning More
Survey of Commercial Defense Approaches
Mazu Enforcer by Mazu Networks
Peakflow by Arbor Networks
WS Series Appliances by Webscreen Technologies
Captus IPS by Captus Networks
MANAnet Shield by CS3
Cisco Traffic Anomaly Detector XT and Cisco Guard XT
StealthWatch by Lancope
DDoS Data
2004 CSI/FBI Computer Crime and Security Survey
Inferring Internet Denial-of-Service Activity
A Framework for Classifying Denial-of- Service Attacks
Observations and Experiences Tracking Denial-of-Service Attacks across a Regional ISP
Report on the DDoS Attack on the DNS Root Servers