0%

Book Description

Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do?

Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack.

Inside, you'll find comprehensive information on the following topics

  • How denial-of-service attacks are waged

  • How to improve your network's resilience to denial-of-service attacks

  • What to do when you are involved in a denial-of-service attack

  • The laws that apply to these attacks and their implications

  • How often denial-of-service attacks occur, how strong they are, and the kinds of damage they can cause

  • Real examples of denial-of-service attacks as experienced by the attacker, victim, and unwitting accomplices

The authors' extensive experience in handling denial-of-service attacks and researching defense approaches is laid out clearly in practical, detailed terms.



Table of Contents

  1. Title Page
  2. Copyright Page
  3. Contents at a Glance
  4. Foreword
  5. Acknowledgments
  6. About the Authors
  7. Chapter 1. Introduction
  8. Chapter 2. Understanding Denial of Service
  9. Chapter 3. History of DoS and DDoS
  10. Chapter 4. How Attacks Are Waged
  11. Chapter 5. An Overview of DDoS Defenses
  12. Chapter 6. Detailed Defense Approaches
  13. Chapter 7. Survey of Research Defense Approaches
  14. Chapter 8. Legal Issues
  15. Chapter 9. Conclusions
  16. Appendix A. Glossary
  17. Appendix B. Survey of Commercial Defense Approaches
  18. Appendix C. DDoS Data
  19. References
  20. Index
  21. Footnote
    1. Chapter 2
    2. Chapter 3
    3. Chapter 4
    4. Chapter 5
    5. Chapter 6
    6. Chapter 7
    7. Chapter 8
    8. Appendix 3
18.117.182.179