Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Distributed Denial of Service Attack and DefenseAn Overview of DDoS Attacks

Distributed Denial of Service Attack and Defense: An Overview of DDoS Attacks [In this chapter, we firstly review the short history of denial of service (DoS) and distributed denial of service (DDoS) attacks. We further explore the reasons why the current cyberspace is a heaven for cyber criminals, such as DDoS attackers. We present the challenges of the DDoS related research fields from various aspects, and discuss the possible research methods and strategies to serve the challenges.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Distributed Denial of Service Attack and DefenseAn Overview of DDoS Attacks

Loading next page...
 
/lp/springer-journals/distributed-denial-of-service-attack-and-defense-an-overview-of-ddos-y3zKRri8Zq
Publisher
Springer New York
Copyright
© The Author(s) 2014
ISBN
978-1-4614-9490-4
Pages
1 –14
DOI
10.1007/978-1-4614-9491-1_1
Publisher site
See Chapter on Publisher Site

Abstract

[In this chapter, we firstly review the short history of denial of service (DoS) and distributed denial of service (DDoS) attacks. We further explore the reasons why the current cyberspace is a heaven for cyber criminals, such as DDoS attackers. We present the challenges of the DDoS related research fields from various aspects, and discuss the possible research methods and strategies to serve the challenges.]

Published: Oct 15, 2013

Keywords: Malicious Node; Malicious Activity; Social Network Technology; Attack Tool; Attack Source

There are no references for this article.