eBook - ePub
Distributed Denial of Service Attacks
Concepts, Mathematical and Cryptographic Solutions
Rajeev Singh, Mangey Ram, Rajeev Singh, Mangey Ram
This is a test
Partager le livre
- 232 pages
- English
- ePUB (adapté aux mobiles)
- Disponible sur iOS et Android
eBook - ePub
Distributed Denial of Service Attacks
Concepts, Mathematical and Cryptographic Solutions
Rajeev Singh, Mangey Ram, Rajeev Singh, Mangey Ram
DĂ©tails du livre
Aperçu du livre
Table des matiĂšres
Citations
Ă propos de ce livre
This book presents new concepts against Distributed Denial of Service (DDoS) attacks. It follows a systematic approach providing cryptographic and mathematical solutions that include aspects of encryption, decryption, hashing techniques, digital signatures, authentication, probability, statistical improvements to machine learning and soft computing as well as latest trends like blockchains to mitigate DDoS attacks.
Foire aux questions
Comment puis-je résilier mon abonnement ?
Il vous suffit de vous rendre dans la section compte dans paramĂštres et de cliquer sur « RĂ©silier lâabonnement ». Câest aussi simple que cela ! Une fois que vous aurez rĂ©siliĂ© votre abonnement, il restera actif pour le reste de la pĂ©riode pour laquelle vous avez payĂ©. DĂ©couvrez-en plus ici.
Puis-je / comment puis-je télécharger des livres ?
Pour le moment, tous nos livres en format ePub adaptĂ©s aux mobiles peuvent ĂȘtre tĂ©lĂ©chargĂ©s via lâapplication. La plupart de nos PDF sont Ă©galement disponibles en tĂ©lĂ©chargement et les autres seront tĂ©lĂ©chargeables trĂšs prochainement. DĂ©couvrez-en plus ici.
Quelle est la différence entre les formules tarifaires ?
Les deux abonnements vous donnent un accĂšs complet Ă la bibliothĂšque et Ă toutes les fonctionnalitĂ©s de Perlego. Les seules diffĂ©rences sont les tarifs ainsi que la pĂ©riode dâabonnement : avec lâabonnement annuel, vous Ă©conomiserez environ 30 % par rapport Ă 12 mois dâabonnement mensuel.
Quâest-ce que Perlego ?
Nous sommes un service dâabonnement Ă des ouvrages universitaires en ligne, oĂč vous pouvez accĂ©der Ă toute une bibliothĂšque pour un prix infĂ©rieur Ă celui dâun seul livre par mois. Avec plus dâun million de livres sur plus de 1 000 sujets, nous avons ce quâil vous faut ! DĂ©couvrez-en plus ici.
Prenez-vous en charge la synthÚse vocale ?
Recherchez le symbole Ăcouter sur votre prochain livre pour voir si vous pouvez lâĂ©couter. Lâoutil Ăcouter lit le texte Ă haute voix pour vous, en surlignant le passage qui est en cours de lecture. Vous pouvez le mettre sur pause, lâaccĂ©lĂ©rer ou le ralentir. DĂ©couvrez-en plus ici.
Est-ce que Distributed Denial of Service Attacks est un PDF/ePUB en ligne ?
Oui, vous pouvez accĂ©der Ă Distributed Denial of Service Attacks par Rajeev Singh, Mangey Ram, Rajeev Singh, Mangey Ram en format PDF et/ou ePUB ainsi quâĂ dâautres livres populaires dans Technik & Maschinenbau et Automatisierung im Maschinenbau. Nous disposons de plus dâun million dâouvrages Ă dĂ©couvrir dans notre catalogue.
Informations
New techniques for DDoS attacks mitigation in resource-constrained networks
Maria Nenova
Faculty of Telecommunications, Technical University of Sofia, Bulgaria
Georgi Iliev
Faculty of Telecommunications, Technical University of Sofia, Bulgaria
Shaikh Javed Rasheed
Department of Electronics and Telecommunication, SKN Sinhgad Institute of Technology and Science, Lonavala, India
Karuna Suryakant Bhosale
Department of Electronics and Telecommunication, Vishwaniketanâs Institute of Management, Engineering, Entrepreneurship and Technology, Khalapur. (Last Institute), India
Abstract
Nowadays use of Internet for transaction is very common. The end users that are accessing Internet or system are vulnerable to malicious user attacks which results into legitimate user being prevented from accessing Internet. There are number of solutions reported under the different categories to detect such attacks and prevent them from harming the communication networks. However, the key challenges for such methods are to address the detection accuracy concerns as most of the present methods evaluated on publicly available network threats datasets rather than the real-time network traffic. The real-time data traffic may contain the noisy parts which may leads to the wrong prediction using the existing methods. This motivates us to design the novel Intrusion Detection System (IDS) framework for communication networks to detect the different types of security threats from both real time and offline traffic flows using the data preprocessing, features selection, and classification algorithms. We believe that, the accuracy and efficiency of attacks detection is based on correctness of capture data traffic. In this chapter we present the multiple algorithms to obtain the more accuracy as compare the existing techniques. The proposed framework is called as modified naĂŻve Bayes based IDS (MNBDIS). There are three main contributions of this research work such as: first we proposed the novel data preprocessing algorithm for both online and offline traffic flows of communication networks in which the irrelevant fields elimination, data normalization, and transformation steps designed. After the preprocessing, we proposed the novel features selection algorithm to enhance the attacks detection accuracy. The proposed hybrid features selection algorithm designed mainly to retain the most relevant features. In final contribution, we overcome the challenges of naĂŻve Bayes classification algorithm to classify the different types of security threats in communication networks by modified naĂŻve Bayes classifier. The proposed classifiers perform the self-evaluations of attacks and detect the most accurate attack based on features selected. The experimental results of proposed contributions on both real-time captured communication network data traffic and research dataset shows the efficiency of proposed method against the state-of-art solutions.
With the increase of E-commerce use, cheating and snooping is also increasing. To develop the E-commerce system, security and privacy are two main issues over the Internet. The Internet does not offer much security required for it. Stealing data is undetectable in most cases. Most surveys list shows that, insecurity of financial transactions and loss of privacy among the major concerns to electronic commerce users. In order to increase E-commerce business, it is very important to gain the trust of customers by continuously reviewing and resolving all new security issues related to it. It is widely recognized that distributed denial-of-service (DDoS) attacks can disrupt electronic commerce and cause large revenue losses. However, effective defenses continue to be mostly unavailable. As the result of above discussion, the two primary goals of this chapter are formed: one is to propose secure, efficient, lightweight, and reliable mechanism for the E-commerce environment to enhance its security and to protect the userâs/customerâs confidential information over the insecure network by providing authentication, authorization, and integrity services and another is to design and develop the new classifier that can be used in improved authorization model of E-commerce system to protect the E-commerce transactions from the malicious DoS attack. The classifier should easily classify between the authorized user and unauthorized user in the E-commerce transactions.
Keywords: DDoS, IDS, MNBIDS, E-commerce, GSO-SVNN,
1 Critical review of different security threats in resource-constrained networks
With the growth of information technology and popularization of the Internet, the n...