Normal view MARC view ISBD view

Distributed Denial of Service Attacks : Concepts, Mathematical and Cryptographic Solutions / ed. by Rajeev Singh, Mangey Ram.

Contributor(s): Araujo, Jean [contributor.] | Banerjee, Mahesh [contributor.] | Bhadula, Rakesh Chandra [contributor.] | Bhasin, Anshu [contributor.] | Dantas, Jamilson [contributor.] | Goswami, Shikha [contributor.] | Iliev, Georgi [contributor.] | Javed Rasheed, Shaikh [contributor.] | Kala, V. N [contributor.] | Kholiya, Deepak [contributor.] | Kumar Awasthi, Lalit [contributor.] | Kumar Mishra, Amit [contributor.] | Maciel, Paulo [contributor.] | Maciel, Ronierison [contributor.] | Melo, Carlos [contributor.] | Nenova, Maria [contributor.] | Novalić, Fadil [contributor.] | Pandey, Richa [contributor.] | Pepić, Selver [contributor.] | Pereira, Paulo [contributor.] | Ram, Mangey [editor.] | Saračević, Muzafer [contributor.] | Sharma, Ankita [contributor.] | Sharma, K. P [contributor.] | Sharma, T. P [contributor.] | Singh, Rajeev [contributor.] | Singh, Rajeev [editor.] | Singh, Rohit [contributor.] | Suryakant Bhosale, Karuna [contributor.] | Verma, Govind [contributor.].
Material type: materialTypeLabelBookSeries: De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences , 6.Publisher: Berlin ; Boston : De Gruyter, [2021]Copyright date: ©2021Description: 1 online resource (XIV, 218 p.).Content type: text Media type: computer Carrier type: online resourceISBN: 9783110619751.Subject(s): Computer networks -- Security measures | Denial of service attacks | Fuzzy Logik | IT-Sicherheit | Informatik | Neuronaleas Netz | Technology & Engineering / AutomationAdditional physical formats: No title; No titleDDC classification: 005.87 Other classification: ZN 6030 Online resources: Click here to access online | Click here to access online | Cover Issued also in print.
Contents:
Frontmatter -- Preface -- Acknowledgments -- About the Editors -- Contents -- List of contributors -- Impact evaluation of DDoS and Malware attack using IoT devices -- Understanding and implementation of machine learning using support vector machine for efficient DDoS attack detection -- Cryptographic method based on Catalan objects and enumerative chess problem -- Distributed denial-of-service attacks and mitigation in wireless sensor networks -- New techniques for DDoS attacks mitigation in resource-constrained networks -- Detection and behavioral analysis of botnets using honeynets and classification techniques -- Selected practical and effective techniques to combat distributed denial-of-service (DDoS) attacks -- Probability, queuing, and statistical perspective in the distributed denial-of-service attacks domain -- Frequently used machine learning algorithm for detecting the distributed denial-of-service (DDoS) attacks -- Utilization of puzzles for protection against DDoS attacks -- Index
Title is part of eBook package:DG Ebook Package English 2021Title is part of eBook package:DG Plus DeG Package 2021 Part 1Title is part of eBook package:EBOOK PACKAGE COMPLETE 2021 EnglishTitle is part of eBook package:EBOOK PACKAGE COMPLETE 2021Title is part of eBook package:EBOOK PACKAGE Engineering, Computer Sciences 2021 EnglishTitle is part of eBook package:EBOOK PACKAGE Engineering, Computer Sciences 2021Summary: This book presents new concepts against Distributed Denial of Service (DDoS) attacks. It follows a systematic approach providing cryptographic and mathematical solutions that include aspects of encryption, decryption, hashing techniques, digital signatures, authentication, probability, statistical improvements to machine learning and soft computing as well as latest trends like blockchains to mitigate DDoS attacks.
    average rating: 0.0 (0 votes)
No physical items for this record

Frontmatter -- Preface -- Acknowledgments -- About the Editors -- Contents -- List of contributors -- Impact evaluation of DDoS and Malware attack using IoT devices -- Understanding and implementation of machine learning using support vector machine for efficient DDoS attack detection -- Cryptographic method based on Catalan objects and enumerative chess problem -- Distributed denial-of-service attacks and mitigation in wireless sensor networks -- New techniques for DDoS attacks mitigation in resource-constrained networks -- Detection and behavioral analysis of botnets using honeynets and classification techniques -- Selected practical and effective techniques to combat distributed denial-of-service (DDoS) attacks -- Probability, queuing, and statistical perspective in the distributed denial-of-service attacks domain -- Frequently used machine learning algorithm for detecting the distributed denial-of-service (DDoS) attacks -- Utilization of puzzles for protection against DDoS attacks -- Index

restricted access online access with authorization star

http://purl.org/coar/access_right/c_16ec

This book presents new concepts against Distributed Denial of Service (DDoS) attacks. It follows a systematic approach providing cryptographic and mathematical solutions that include aspects of encryption, decryption, hashing techniques, digital signatures, authentication, probability, statistical improvements to machine learning and soft computing as well as latest trends like blockchains to mitigate DDoS attacks.

Issued also in print.

Mode of access: Internet via World Wide Web.

In English.

Description based on online resource; title from PDF title page (publisher's Web site, viewed 28. Feb 2023)

There are no comments for this item.

Log in to your account to post a comment.