Distributed Denial of Service Attacks : Concepts, Mathematical and Cryptographic Solutions /
ed. by Rajeev Singh, Mangey Ram.
- 1 online resource (XIV, 218 p.)
- De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences , 6 2626-5427 ; .
Frontmatter -- Preface -- Acknowledgments -- About the Editors -- Contents -- List of contributors -- Impact evaluation of DDoS and Malware attack using IoT devices -- Understanding and implementation of machine learning using support vector machine for efficient DDoS attack detection -- Cryptographic method based on Catalan objects and enumerative chess problem -- Distributed denial-of-service attacks and mitigation in wireless sensor networks -- New techniques for DDoS attacks mitigation in resource-constrained networks -- Detection and behavioral analysis of botnets using honeynets and classification techniques -- Selected practical and effective techniques to combat distributed denial-of-service (DDoS) attacks -- Probability, queuing, and statistical perspective in the distributed denial-of-service attacks domain -- Frequently used machine learning algorithm for detecting the distributed denial-of-service (DDoS) attacks -- Utilization of puzzles for protection against DDoS attacks -- Index
restricted access http://purl.org/coar/access_right/c_16ec
This book presents new concepts against Distributed Denial of Service (DDoS) attacks. It follows a systematic approach providing cryptographic and mathematical solutions that include aspects of encryption, decryption, hashing techniques, digital signatures, authentication, probability, statistical improvements to machine learning and soft computing as well as latest trends like blockchains to mitigate DDoS attacks.
Mode of access: Internet via World Wide Web.
In English.
9783110619751
10.1515/9783110619751 doi
Computer networks--Security measures.
Denial of service attacks.
Fuzzy Logik.
IT-Sicherheit.
Informatik.
Neuronaleas Netz.
Technology & Engineering / Automation.
TK5105.59 / .D57 2021
005.87
Frontmatter -- Preface -- Acknowledgments -- About the Editors -- Contents -- List of contributors -- Impact evaluation of DDoS and Malware attack using IoT devices -- Understanding and implementation of machine learning using support vector machine for efficient DDoS attack detection -- Cryptographic method based on Catalan objects and enumerative chess problem -- Distributed denial-of-service attacks and mitigation in wireless sensor networks -- New techniques for DDoS attacks mitigation in resource-constrained networks -- Detection and behavioral analysis of botnets using honeynets and classification techniques -- Selected practical and effective techniques to combat distributed denial-of-service (DDoS) attacks -- Probability, queuing, and statistical perspective in the distributed denial-of-service attacks domain -- Frequently used machine learning algorithm for detecting the distributed denial-of-service (DDoS) attacks -- Utilization of puzzles for protection against DDoS attacks -- Index
restricted access http://purl.org/coar/access_right/c_16ec
This book presents new concepts against Distributed Denial of Service (DDoS) attacks. It follows a systematic approach providing cryptographic and mathematical solutions that include aspects of encryption, decryption, hashing techniques, digital signatures, authentication, probability, statistical improvements to machine learning and soft computing as well as latest trends like blockchains to mitigate DDoS attacks.
Mode of access: Internet via World Wide Web.
In English.
9783110619751
10.1515/9783110619751 doi
Computer networks--Security measures.
Denial of service attacks.
Fuzzy Logik.
IT-Sicherheit.
Informatik.
Neuronaleas Netz.
Technology & Engineering / Automation.
TK5105.59 / .D57 2021
005.87