The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks – Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them.
- Covers topics that describe taxonomies of the DDoS attacks in detail, recent trends and classification of defensive mechanisms on the basis of deployment location, the types of defensive action, and the solutions offering economic incentives.
- Introduces chapters discussing the various types of DDoS attack associated with different layers of security, an attacker’s motivations, and the importance of incentives and liabilities in any defensive solution.
- Illustrates the role of fair resource-allocation schemes, separate payment mechanisms for attackers and legitimate users, negotiation models on cost and types of resources, and risk assessments and transfer mechanisms.
DDoS Attacks – Classification, Attacks, Challenges, and Countermeasures is designed for the readers who have an interest in the cybersecurity domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals who are focusing on developing defensive schemes and applications for detecting or mitigating the DDoS attacks, and faculty members across different universities.
Table of Contents
1. Fundamentals of DDoS Attack: Evolution and Challenges
2. Role of Incentives, Liabilities and Cyber Insurance
3. Taxonomy of DDoS Defence Mechanisms
4. Taxonomy of Economical Solutions
5. DDoS Attacks on Various Platforms
6. Emerging Solutions for DDoS Attack: Based on SDSN and Blockchain Technologies
Brij B. Gupta is Assistant Professor in the Department of Computer Engineering, National Institute of Technology Kurukshetra India. His research interests include Information Security, Cyber Security, Cloud Computing, Web Security, Intrusion Detection and Phishing. He received his PhD degree from Indian Institute of Technology Roorkee, India in the area of Information and Cyber Security. He has published more than 250 research papers in International Journals and Conferences of high repute including IEEE, Elsevier, ACM, Springer, Wiley, Taylor & Francis, and Inderscience. He is serving as associate editor of IEEE Access, IEEE TII, Associate editor of IJICS, Inderscience and Executive editor of IJITCA, Inderscience, respectively. Amrita Dahiya is a Research Scholar in the Department of Computer Engineering, National Institute of Technology Kurukshetra India