![]() ![]() DDoS Research: Traffic 5.1 Dataset 5.1.1 Classification 5.1.2 Features 5.2 Traffic Generation 5.2.1 Approaches 5.2.2 Tools 5.2.2.1 Stress Testing / Attack Traffic Generation Tools 5.2.2.2 Background Traffic Generation Tools 5.2.2.3 Replay Tools 5.3 (D)DoS Benchmark Datasets 5.4 Discussion 5.5 Problems 5.6 Glossary 6. Legal Considerations 4.1 Introduction 4.2 Laws against DDoS 4.3 Jurisdiction 4.4 DDoS Liability 4.5 Protest 4.6 Cyberwar 4.7 Conclusion 4.8 Problems 4.9 Glossary 5. History and Motivation 3.1 A Brief History of Computers and Computer Crime 3.2 DDoS Tools and Technologies 3.2.1 DDoS Bots and Stressers 3.2.2 Botnets 3.2.3 Worms 3.2.4 DNS DDoS 3.2.5 BGP Exploits 3.3 DDoS History 3.3.1 Early DoS 3.3.2 Hackers 3.3.2.1 L0pht 3.3.2.2 Ma aboy 3.3.3 Commercial Exploitation 3.3.3.1 DDoS for Hire 3.3.3.2 Ransomware 3.3.4 Censorship 3.3.4.1 Myanmar 3.3.4.2 Kyrgyzstan 3.3.4.3 Kazakh 3.3.4.4 Iran 3.3.4.5 Vietnam 3.3.4.6 Radio Free Europe/Radio Liberty 3.3.4.7 Krebs on Security 3.3.5 Cyberwar 3.3.5.1 Hainan 3.3.5.2 Estonia 3.3.5.3 Georgia 3.3.5.4 Ukraine 3.3.5.5 Israel 3.3.5.6 US and Korea 3.3.6 Hacktivism and/or Terrorism 3.3.6.1 Electronic Disturbance Theater 3.3.6.2 Electrohippies 3.3.6.3 Lufthansa 3.3.6.4 Russian Election 3.3.6.5 Chanology 3.3.6.6 CNN 3.3.6.7 Operations Titstorm and Payback 3.3.6.8 Lizard Squad 3.3.6.9 Black Lives Matter 3.3.6.10 Syrian Electronic Army 3.3.6.11 Daesh 3.3.7 Internet Blackouts 3.4 Conclusions 3.5 Problems 3.6 Glossary 4. What is DDoS? 2.1 Definition 2.2 Classification 2.2.1 Resource Saturation 2.2.1.1 System/Device Resources 2.2.1.2 Network Bandwidth 2.2.2 Exploiting Vulnerability 2.2.3 Tampering 2.2.4 Misuse 2.2.4.1 Fragmentation and Reassembly 2.2.4.2 TCP-based 2.2.4.3 Low and Slow Attacks 2.2.4.4 Filtering 2.2.4.5 Others 2.2.5 Physical Destruction 2.3 Botnet 2.3.1 Botnet Architectures 2.3.2 Botnet Topologies 2.3.2.1 Star 2.3.2.2 Multi-server 2.3.2.3 Hierarchical 2.3.2.4 Random 2.3.3 Botnet Resilience and CnC Resolution 2.3.3.1 IP Flux 2.3.3.2 Domain Flux 2.3.3.3 Blind Proxy Redirection 2.4 Attack Tools 2.4.1 Classification of Attack Tools 2.4.2 Popular Attack Tools 2.5 Problems 2.6 Glossary 3. Introduction 1.1 Performance Testing and Analysis of DDoS Detection Approaches 1.2 Deceiving DDoS Detection 1.3 DDoS Mitigation 1.4 Organization 2. ![]() ![]() Table of contents : Cover Half Title Title Page Copyright Page Dedication Contents Foreword About the Authors Acknowledgments Preface Contributors 1. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |