AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
![]() What is DDoS? 2.1 Definition 2.2 Classification 2.2.1 Resource Saturation 2.2.1.1 System/Device Resources 2.2.1.2 Network Bandwidth 2.2.2 Exploiting Vulnerability 2.2.3 Tampering 2.2.4 Misuse 2.2.4.1 Fragmentation and Reassembly 2.2.4.2 TCP-based 2.2.4.3 Low and Slow Attacks 2.2.4.4 Filtering 2.2.4.5 Others 2.2.5 Physical Destruction 2.3 Botnet 2.3.1 Botnet Architectures 2.3.2 Botnet Topologies 2.3.2.1 Star 2.3.2.2 Multi-server 2.3.2.3 Hierarchical 2.3.2.4 Random 2.3.3 Botnet Resilience and CnC Resolution 2.3.3.1 IP Flux 2.3.3.2 Domain Flux 2.3.3.3 Blind Proxy Redirection 2.4 Attack Tools 2.4.1 Classification of Attack Tools 2.4.2 Popular Attack Tools 2.5 Problems 2.6 Glossary 3. ![]() Introduction 1.1 Performance Testing and Analysis of DDoS Detection Approaches 1.2 Deceiving DDoS Detection 1.3 DDoS Mitigation 1.4 Organization 2. Table of contents : Cover Half Title Title Page Copyright Page Dedication Contents Foreword About the Authors Acknowledgments Preface Contributors 1.
0 Comments
Read More
Leave a Reply. |