Internet Denial of Service: Attack and Defense Mechanisms
暫譯: 網際網路拒絕服務:攻擊與防禦機制

Sven Dietrich, David Dittrich, Peter Reiher

  • 出版商: Prentice Hall
  • 出版日期: 2004-11-01
  • 售價: $1,880
  • 貴賓價: 9.5$1,786
  • 語言: 英文
  • 頁數: 400
  • 裝訂: Paperback
  • ISBN: 0131475738
  • ISBN-13: 9780131475731
  • 已絕版

買這商品的人也買了...

相關主題

商品描述

Description:

Internet Denial of Service provides an in-depth look at the history and future of DDoS attacks. The authors draw on their extensive experience with actual DDoS attacks to offer practical methods for defending against and responding to such crimes. They also survey the commercial DDoS defense tools currently available and share the pros and cons of various defense strategies.

 

Table of Contents:

Foreword.

Acknowledgments.

About the Authors.

1. Introduction.

    DoS and DdoS

    Why Should We Care?

    What Is This Book?

    Who Is This Book For?

    What Can This Book Help You Do?

    Outline of the Remaining Chapters

2. Understanding Denial of Service.

    The Ulterior Motive

    Meet the Attackers

    Behind the Scenes

    Distribution Effects

    DDoS: Hype or Reality?

    How Vulnerable Are You to DDoS?

3. History of DoS and DDoS.

    Motivation

    Design Principles of the Internet

    DoS and DDoS Evolution

4. How Attacks Are Waged.

    Recruitment of the Agent Network

    Controlling the DDoS Agent Network

    Semantic Levels of DDoS Attacks

    Attack Toolkits

    What Is IP Spoofing?

    DDoS Attack Trends

5. An Overview of DDoS Defenses.

    Why DDoS Is a Hard Problem

    DDoS Defense Challenges

    Prevention versus Protection and Reaction

    DDoS Defense Goals

    DDoS Defense Locations

    Defense Approaches

6. Detailed Defense Approaches.

    Thinking about Defenses

    General Strategy for DDoS Defense

    Preparing to Handle a DDoS Attack

    Handling an Ongoing DDoS Attack as a Target

    Handling an Ongoing DDoS Attack as a Source

    Agreements/Understandings with Your ISP

    Analyzing DDoS tools

7. Survey of Research Defense Approaches.

    Pushback

    Traceback

    D-WARD

    NetBouncer

    Secure Overlay Services (SOS)

    Proof of Work

    DefCOM

    COSSACK

    Pi

    SIFF: An End-Host Capability Mechanism to Mitigate DDoS Flooding Attacks

    Hop-Count Filtering (HCF)

    Locality and Entropy Principles

    An Empirical Analysis of Target-Resident DoS Filters

    Research Prognosis

8. Legal Issues.

    Basics of the U.S. Legal System

    Laws That May Apply to DDoS Attacks

    Who Are the Victims of DDoS?

    How Often Is Legal Assistance Sought in DDoS Cases?

    Initiating Legal Proceedings as a Victim of DdoS

    Evidence Collection and Incident Response Procedures

    Estimating Damages

    Jurisdictional Issues

    Domestic Legal Issues

    International Legal Issues

    Self-Help Options

    A Few Words on Ethics

    Current Trends in International Cyber Law

9. Conclusions.

    Prognosis for DdoS

    Social, Moral, and Legal Issues

    Resources for Learning More

    Conclusion

Appendix A. Glossary.

Appendix B. Survey of Commercial Defense Approaches.

    Mazu Enforcer by Mazu Networks

    Peakflow by Arbor Networks

    WS Series Appliances by Webscreen Technologies

    Captus IPS by Captus Networks

    MANAnet Shield by CS3

    Cisco Traffic Anomaly Detector XT and Cisco Guard XT

    StealthWatch by Lancope

    Summary

Appendix C. DDoS Data.

    2004 CSI/FBI Computer Crime and Security Survey

    Inferring Internet Denial-of-Service Activity

    A Framework for Classifying Denial-of- Service Attacks

    Observations and Experiences Tracking Denial-of-Service Attacks across a Regional ISP

    Report on the DDoS Attack on the DNS Root Servers

    Conclusion

References.

Index.

商品描述(中文翻譯)

描述:



網際網路拒絕服務深入探討了DDoS攻擊的歷史和未來。作者利用他們在實際DDoS攻擊中的豐富經驗,提供了防禦和應對這類犯罪的實用方法。他們還調查了當前可用的商業DDoS防禦工具,並分享了各種防禦策略的優缺點。



 


目錄:



前言。


致謝。


關於作者。


1. 介紹。


    DoS和DDoS


    我們為什麼要關心?


    這本書是什麼?


    這本書適合誰?


    這本書能幫助你做什麼?


    其餘章節的概要


2. 理解拒絕服務。


    隱藏的動機


    認識攻擊者


    幕後故事


    分佈效應


    DDoS:炒作還是現實?


    你對DDoS的脆弱性有多大?


3. DoS和DDoS的歷史。


    動機


    網際網路的設計原則


    DoS和DDoS的演變


4. 攻擊是如何發動的。


    招募代理網絡


    控制DDoS代理網絡


    DDoS攻擊的語義層次


    攻擊工具包


    什麼是IP欺騙?


    DDoS攻擊趨勢


5. DDoS防禦概述。


    為什麼DDoS是一個難題


    DDoS防禦挑戰


    預防與保護及反應


    DDoS防禦目標


    DDoS防禦位置


    防禦方法


6. 詳細防禦方法。


    思考防禦


    DDoS防禦的一般策略


    準備應對DDoS攻擊


    作為目標處理正在進行的DDoS攻擊


    作為來源處理正在進行的DDoS攻擊


    與你的ISP的協議/理解


    分析DDoS工具


7. 研究防禦方法調查。


    反擊


    追蹤


    D-WARD


    NetBouncer


    安全覆蓋服務 (SOS)


    工作證明


    DefCOM


    COSSACK


    Pi


    SIFF:一種減輕DDoS洪水攻擊的終端能力機制


    跳數過濾 (HCF)


    局部性和熵原則


    目標居民DoS過濾器的實證分析


    研究預測


8. 法律問題。


    美國法律系統的基本知識


    可能適用於DDoS攻擊的法律


    DDoS的受害者是誰?


    在DDoS案件中尋求法律協助的頻率有多高?


    作為DDoS的受害者啟動法律程序


    證據收集和事件響應程序


    估算損害


    管轄權問題


    國內法律問題


    國際法律問題


    自助選項


    關於倫理的幾句話


    當前國際網路法律的趨勢


9. 結論。


    DDoS的預測


    所以