03172nam 2200529 450 991055422670332120230629233309.03-11-061975-X10.1515/9783110619751(CKB)5590000000532519(DE-B1597)527572(DE-B1597)9783110619751(MiAaPQ)EBC6701291(Au-PeEL)EBL6701291(OCoLC)1262307826(EXLCZ)99559000000053251920220502d2021 uy 0engur||#||||||||txtrdacontentcrdamediacrrdacarrierDistributed denial of service attacks concepts, mathematical and cryptographic solutions /edited by Rajeev Singh and Mangey RamBerlin ;Boston :De Gruyter,[2021]©20211 online resource (XIV, 218 p.)De Gruyter series on the applications of mathematics in engineering and information sciences ;6Includes index.3-11-061675-0 Frontmatter --Preface --Acknowledgments --About the Editors --Contents --List of contributors --Impact evaluation of DDoS and Malware attack using IoT devices --Understanding and implementation of machine learning using support vector machine for efficient DDoS attack detection --Cryptographic method based on Catalan objects and enumerative chess problem --Distributed denial-of-service attacks and mitigation in wireless sensor networks --New techniques for DDoS attacks mitigation in resource-constrained networks --Detection and behavioral analysis of botnets using honeynets and classification techniques --Selected practical and effective techniques to combat distributed denial-of-service (DDoS) attacks --Probability, queuing, and statistical perspective in the distributed denial-of-service attacks domain --Frequently used machine learning algorithm for detecting the distributed denial-of-service (DDoS) attacks --Utilization of puzzles for protection against DDoS attacks --IndexThis book presents new concepts against Distributed Denial of Service (DDoS) attacks. It follows a systematic approach providing cryptographic and mathematical solutions that include aspects of encryption, decryption, hashing techniques, digital signatures, authentication, probability, statistical improvements to machine learning and soft computing as well as latest trends like blockchains to mitigate DDoS attacks.De Gruyter series on the applications of mathematics in engineering and information sciences ;6.Denial of service attacksComputer networksSecurity measuresDenial of service attacks.Computer networksSecurity measures.005.87GM 5294DE-25/sred20rvkSingh RajeevRam MangeyMiAaPQMiAaPQMiAaPQBOOK9910554226703321Distributed Denial of Service Attacks2819012UNINA