Distributed Denial of Service Attack and DefenseAn Overview of DDoS Attacks
Distributed Denial of Service Attack and Defense: An Overview of DDoS Attacks
Yu, Shui
2013-10-15 00:00:00
[In this chapter, we firstly review the short history of denial of service (DoS) and distributed denial of service (DDoS) attacks. We further explore the reasons why the current cyberspace is a heaven for cyber criminals, such as DDoS attackers. We present the challenges of the DDoS related research fields from various aspects, and discuss the possible research methods and strategies to serve the challenges.]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/distributed-denial-of-service-attack-and-defense-an-overview-of-ddos-y3zKRri8Zq
Distributed Denial of Service Attack and DefenseAn Overview of DDoS Attacks
[In this chapter, we firstly review the short history of denial of service (DoS) and distributed denial of service (DDoS) attacks. We further explore the reasons why the current cyberspace is a heaven for cyber criminals, such as DDoS attackers. We present the challenges of the DDoS related research fields from various aspects, and discuss the possible research methods and strategies to serve the challenges.]
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.