Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by Rich Groves, Eric Chou
Distributed Denial of Service (DDoS)
Foreword
1. DDoS Attacks: Overview
What Are DDoS Attacks?
Why Are DDoS Attacks Effective?
Who Is Behind the Attacks and What Is Their Motivation?
Criminals
Thrill Seekers and Status Seekers
Angry and Disgruntled Users
Hacktivist
Common Types of DDoS Attacks
Volumetric Floods
Network Protocol–Level Attacks
Amplification and Reflection
Application-Level Attacks
Multivector Attacks
Botnets and IoT Devices
Summary
2. DDoS Detection
Poll-Based Monitoring and Detection
Flow-Based Network Parameter Detections
Network Mirrors and Deep Packet Inspection
Anomalies and Frequency-Based Detections
Summary
3. DDoS Mitigation and Countermeasures
DDoS Terms and Traffic Flow
Traffic Flood
Source Spoofing
Reflection and Amplification
DDoS Mitigation Topology
Reactive Versus Proactive Always-On Mitigation
Potential Points of Attack Mitigation
Network-Level Mitigation Tools
Session-Level Mitigation Tools
Purpose Built DDoS Mitigation Devices
Example 1: Combating the Classic Flood
Analyzing the Attack
Mitigation Strategy
Example 2: Combating State Exhaustion
Attack Dynamics and Analysis
Mitigation Strategy
Emulate DDoS Attacks for Better Response
Summary
4. Evaluating Cloud-Based Mitigation Vendors
Why Use Cloud-Based DDoS Mitigation?
Overall Cost Savings
Proven Operating Procedure and Knowledge
More Network Visibility and Fewer Bottlenecks
Dedicated Staff and Better Reaction Time
When Not to Use Cloud-Based DDoS Mitigation
Control
Customization
Vendor Lock-In
Security Boundaries
Cloud-Based DDoS Mitigation Methods
DDoS Detection Mechanism in the Cloud
DDoS Mitigation Mechanism in the Cloud
DDoS Event Reporting
Hybrid Model
Summary
5. DDoS Focused Threat Intelligence
IP Blocklists
Community Supported Efforts
IP Geolocation Providers
Purpose-Built Node Lists
Honeypots
DDoS-as-a-Service
Summary
6. Final Thoughts
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Distributed Denial of Service (DDoS)
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset