Book description
Distributed Denial of Service (DDoS) attacks have existed for almost as long as the commercial web itself, and they remain one of the most effective ways to disrupt online services. But, since many of these attacks go undisclosed, industry collaboration on ways to combat them has been slow to emerge. This ebook provides engineers and IT managers with techniques for detecting and mitigating ongoing and potential DDoS events.
Authors Rich Groves and Eric Chou explain how DDoS can disrupt services by flooding your network with traffic from many different sources, often by using a botnet. You’ll learn about the people behind these attacks and their motivations—such as criminals seeking financial gain, thrill and status seekers, and angry and disgruntled users—and ways that you can thwart them.
The techniques in this ebook enable small to mid-sized organizations to implement DDoS prevention measures on a budget—before the size of your infrastructure requires the services of a commercial DDoS vendor.
- Get an overview of DDoS, including common attacks, botnet-driven attacks, and those that take advantage of IoT devices
- Explore the pros and cons of current DDoS detection methods and mechanisms
- Study the approach to DDoS mitigation at the network and application level, including ways to combat SYN Flood and Classic Flood attacks
- Evaluate cloud-based DDoS detection and mitigation vendors to determine the best fit for your organization
- Learn how to leverage community-based systems to construct a DDoS-focused Threat Intelligence system
Table of contents
- Foreword
- 1. DDoS Attacks: Overview
- 2. DDoS Detection
- 3. DDoS Mitigation and Countermeasures
- 4. Evaluating Cloud-Based Mitigation Vendors
- 5. DDoS Focused Threat Intelligence
- 6. Final Thoughts
Product information
- Title: Distributed Denial of Service (DDoS)
- Author(s):
- Release date: April 2018
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781492026174
You might also like
book
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in …
book
Applied Network Security Monitoring
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground …
book
Implementing SSL/TLS Using Cryptography and PKI
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a …
book
Applied Network Security
Master the art of detecting and averting advanced network security attacks and techniques About This Book …