Paperback: 400 pages
Publisher: Prentice Hall (January 9, 2005)
Product Dimensions: 7 x 1.1 x 8.9 inches
Shipping Weight: 1.7 pounds (View shipping rates and policies)
Average Customer Review: 4.2 out of 5 stars See all reviews (4 customer reviews)
Best Sellers Rank: #1,115,064 in Books (See Top 100 in Books) #153 in Books > Computers & Technology > Hardware & DIY > Microprocessors & System Design > Computer Design #268 in Books > Computers & Technology > Certification > CompTIA #282 in Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs > LAN
'Internet Denial of Service' (IDOS) is an excellent book by expert authors. IDOS combines sound advice with a fairly complete examination of the denial of service (DoS) problem set. Although the authors write from the DoS point of view, as a network security monitoring advocate I found myself agreeing with many of their insights. Since there are no other books dedicated to DoS, I was very pleased to find this one is a powerful resource for managers and technicians alike.IDOS features some of the best minds on DoS research available. Everyone has heard of Dave Dittrich, but I found the work of lead author Jelena Mirkovic to be particularly valuable. Peter Reiher and long-time DoS researcher Sven Dietrich also give the project considerable weight. All four authors work for or with universities, and IDOS reflects this academic connection by frequently citing papers and DoS research. For example, chapter 7 describe DoS mitigation approaches and Appendix C examines the best available data on DoS techniques. I would encourage other authors to make similar references to the academic community and not write in a literary vacuum.By making references to outside works, IDOS successfully avoids repeating material published elsewhere. Chapter 6 was probably my favorite section, including much distilled wisdom and advice on responding to DoS attacks. I welcomed the authors' frequent recommendations to collect session and full content data. It is often impossible to detect and respond to attacks without this sort of network-based evidence. This point is often lost on vendors or consultants who lack experience performing incident response.I had minor problems with the book. First, I would have liked more technical detail in chapter 6.
There are obviously a multitude of ways an attacker can take your site down. One way is via a denial of service attack. There's a new book out that covers just that attack in great detail: Internet Denial Of Service - Attack and Defense Mechanisms by Jelena Mirkovic, Sven Dietrich, David Dittrich, and Peter Reiher (Prentice Hall).Chapter list: Introduction; Understanding Denial of Service; History of DoS and DDos; How Attacks Are Waged; An Overview of DDoS Defenses; Detailed Defense Approaches; Survey of Research Defense Approaches; Legal Issues; Conclusions; Glossary; Survey of Commercial Defense Approaches; DDoS data; References; IndexGoing into this book, I can say I knew about the basics of a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. What I didn't understand is how sophisticated they've become. The book covers (in deep detail) how bot or zombie networks are developed and utilized to launch these types of attacks. I didn't realize that it's relatively easy to acquire a bot network of over 100000 clients who can flood a site with packets. And it's not even necessary to use them all at once. Attacks can start with a fraction of the clients, and then escalate as the victim attempts to filter packets or add bandwidth. It's a scary thing. The authors also cover the various issues involved in the defense of these types of attacks. Filtering might work, but it can be difficult to find the correct filtering parameters that don't also drop legitimate traffic. And due to the distributed nature of the attack, it can be nearly impossible to find the culprit, and worse, to prevent it from happening again.Walking away from this book, you don't get a warm, fuzzy feeling about the current situation.
Internet Denial of Service: Attack and Defense Mechanisms Wes' Denial: Tease and Denial Book Two Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defense (Advances in Information Security) Next Generation SOA: A Concise Introduction to Service Technology & Service-Orientation (The Prentice Hall Service Technology Series from Thomas Erl) ESP8266: Programming NodeMCU Using Arduino IDE - Get Started With ESP8266: (Internet Of Things, IOT, Projects In Internet Of Things, Internet Of Things for Beginners, NodeMCU Programming, ESP8266) Advanced Organic Chemistry: Part A: Structure and Mechanisms: Structure and Mechanisms Pt. A Self Defense on the Street: Feel Safe Be Safe (Deadly Attack Survival Book 2) Percutaneous Absorption: Drugs--Cosmetics--Mechanisms--Methodology: Drugs--Cosmetics--Mechanisms--Methodology, Third Edition, (Drugs and the Pharmaceutical Sciences) Schaechter's Mechanisms of Microbial Disease (Mechanisms of Microbial Disease (Schaechter)) Why Do I Do That?: Psychological Defense Mechanisms and the Hidden Ways They Shape Our Lives Prepping and Defense Box Set (6 in 1): Concealed Carry, Home Defense, Prepper's First-Aid Kit, Survival Pantry, SHTF Stockpile and Many Other Useful Tips for Real Preppers (Prepping & Homesteading) Department of Defense Instruction DoDI 5000.02 The Operation of the Defense Acquisition System January 2015 Training Your Own Service Dog Book 2: Training Psychiatric Service Dogs - PTSD, Anxiety Disorders, and Depression The Complete Works of Stephen Crane (12 Complete Works of Stephen Crane Including The Red Badge of Courage, Maggie - A Girl of the Streets, Active Service, The O'Ruddy, Active Service, And More) SOA with Java: Realizing Service-Orientation with Java Technologies (The Prentice Hall Service Technology Series from Thomas Erl) 27 Best Free Internet Marketing Tools And Resources for Cheapskates (Online Business Ideas & Internet Marketing Tips fo Book 1) Newton's Telecom Dictionary: covering Telecommunications, The Internet, The Cloud, Cellular, The Internet of Things, Security, Wireless, Satellites, ... Voice, Data, Images, Apps and Video Beyond Powerful Radio: A Communicator's Guide to the Internet Age_News, Talk, Information & Personality for Broadcasting, Podcasting, Internet, Radio Tor Browser: The 2016 Guide (Ensure Internet Privacy, Access The Deep Web, Hide ... anonymity, Tow Browser, Privacy, Internet, Silk Road, Online Privacy) Internet Guide to Cosmetic Surgery for Men (Haworth Internet Medical Guides)