Internet Denial of Service: Attack and Defense Mechanisms
Sven Dietrich, David Dittrich, Peter Reiher
- 出版商: Prentice Hall
- 出版日期: 2004-11-01
- 售價: $1,840
- 貴賓價: 9.5 折 $1,748
- 語言: 英文
- 頁數: 400
- 裝訂: Paperback
- ISBN: 0131475738
- ISBN-13: 9780131475731
已絕版
買這商品的人也買了...
-
$1,205Advanced Programming in the UNIX Environment (Hardcover)
-
$931Data Mining: Practical Machine Learning Tools and Techniques with Java Implement
-
$970Introduction to Algorithms, 2/e
-
$500$395 -
$480$408 -
$1,068Data Mining: Concepts, Models, Methods, and Algorithms
-
$780$741 -
$760$600 -
$920$727 -
$980$399 -
$480$379 -
$490$382 -
$450$360 -
$660$647 -
$1,176Computer Organization and Design: The Hardware/Software Interface, 3/e(IE) (美國版ISBN:1558606041)
-
$650$553 -
$650$507 -
$460$363 -
$520$406 -
$1,250$1,225 -
$1,127Interactive Computer Graphics: A Top-Down Approach using OpenGL, 4/e (美國版ISBN:0321321375 )
-
$520$442 -
$400$360 -
$780$741 -
$400$340
相關主題
商品描述
Description:
Internet Denial of Service provides an in-depth look at the history and future of DDoS attacks. The authors draw on their extensive experience with actual DDoS attacks to offer practical methods for defending against and responding to such crimes. They also survey the commercial DDoS defense tools currently available and share the pros and cons of various defense strategies.
Table of Contents:
Foreword.
Acknowledgments.
About the Authors.
1. Introduction.
DoS and DdoS
Why Should We Care?
What Is This Book?
Who Is This Book For?
What Can This Book Help You Do?
Outline of the Remaining Chapters
2. Understanding Denial of Service.
The Ulterior Motive
Meet the Attackers
Behind the Scenes
Distribution Effects
DDoS: Hype or Reality?
How Vulnerable Are You to DDoS?
3. History of DoS and DDoS.
Motivation
Design Principles of the Internet
DoS and DDoS Evolution
4. How Attacks Are Waged.
Recruitment of the Agent Network
Controlling the DDoS Agent Network
Semantic Levels of DDoS Attacks
Attack Toolkits
What Is IP Spoofing?
DDoS Attack Trends
5. An Overview of DDoS Defenses.
Why DDoS Is a Hard Problem
DDoS Defense Challenges
Prevention versus Protection and Reaction
DDoS Defense Goals
DDoS Defense Locations
Defense Approaches
6. Detailed Defense Approaches.
Thinking about Defenses
General Strategy for DDoS Defense
Preparing to Handle a DDoS Attack
Handling an Ongoing DDoS Attack as a Target
Handling an Ongoing DDoS Attack as a Source
Agreements/Understandings with Your ISP
Analyzing DDoS tools
7. Survey of Research Defense Approaches.
Pushback
Traceback
D-WARD
NetBouncer
Secure Overlay Services (SOS)
Proof of Work
DefCOM
COSSACK
Pi
SIFF: An End-Host Capability Mechanism to Mitigate DDoS Flooding Attacks
Hop-Count Filtering (HCF)
Locality and Entropy Principles
An Empirical Analysis of Target-Resident DoS Filters
Research Prognosis
8. Legal Issues.
Basics of the U.S. Legal System
Laws That May Apply to DDoS Attacks
Who Are the Victims of DDoS?
How Often Is Legal Assistance Sought in DDoS Cases?
Initiating Legal Proceedings as a Victim of DdoS
Evidence Collection and Incident Response Procedures
Estimating Damages
Jurisdictional Issues
Domestic Legal Issues
International Legal Issues
Self-Help Options
A Few Words on Ethics
Current Trends in International Cyber Law
9. Conclusions.
Prognosis for DdoS
Social, Moral, and Legal Issues
Resources for Learning More
Conclusion
Appendix A. Glossary.
Appendix B. Survey of Commercial Defense Approaches.
Mazu Enforcer by Mazu Networks
Peakflow by Arbor Networks
WS Series Appliances by Webscreen Technologies
Captus IPS by Captus Networks
MANAnet Shield by CS3
Cisco Traffic Anomaly Detector XT and Cisco Guard XT
StealthWatch by Lancope
Summary
Appendix C. DDoS Data.
2004 CSI/FBI Computer Crime and Security Survey
Inferring Internet Denial-of-Service Activity
A Framework for Classifying Denial-of- Service Attacks
Observations and Experiences Tracking Denial-of-Service Attacks across a Regional ISP
Report on the DDoS Attack on the DNS Root Servers
Conclusion
References.
Index.