Distributed Denial of Service Attack and DefenseMalicious Networks for DDoS Attacks
Distributed Denial of Service Attack and Defense: Malicious Networks for DDoS Attacks
Yu, Shui
2013-10-15 00:00:00
[In this chapter, we explore botnet, the engine of DDoS attacks, in cyberspace. We focus on two recent techniques that hackers are using to sustain their malicious networks, fast fluxing and domain fluxing. We present the mechanisms of these two techniques and also survey the detection and anti-attack methods that have been proposed against them in literature.]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/distributed-denial-of-service-attack-and-defense-malicious-networks-pBLmFs95HJ
Distributed Denial of Service Attack and DefenseMalicious Networks for DDoS Attacks
[In this chapter, we explore botnet, the engine of DDoS attacks, in cyberspace. We focus on two recent techniques that hackers are using to sustain their malicious networks, fast fluxing and domain fluxing. We present the mechanisms of these two techniques and also survey the detection and anti-attack methods that have been proposed against them in literature.]
Published: Oct 15, 2013
Keywords: Distribute Hash Table; Flux Agent; Botnet Detection; Fast Flux; Internet Worm
Recommended Articles
Loading...
There are no references for this article.
Share the Full Text of this Article with up to 5 Colleagues for FREE
Sign up for your 14-Day Free Trial Now!
Read and print from thousands of top scholarly journals.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.