Chapter
Publicly Available
Contents
Chapters in this book
- Frontmatter I
- Preface V
- Acknowledgments VII
- About the Editors IX
- Contents XI
- List of contributors XIII
- Impact evaluation of DDoS and Malware attack using IoT devices 1
- Understanding and implementation of machine learning using support vector machine for efficient DDoS attack detection 29
- Cryptographic method based on Catalan objects and enumerative chess problem 51
- Distributed denial-of-service attacks and mitigation in wireless sensor networks 67
- New techniques for DDoS attacks mitigation in resource-constrained networks 83
- Detection and behavioral analysis of botnets using honeynets and classification techniques 131
- Selected practical and effective techniques to combat distributed denial-of-service (DDoS) attacks 159
- Probability, queuing, and statistical perspective in the distributed denial-of-service attacks domain 173
- Frequently used machine learning algorithm for detecting the distributed denial-of-service (DDoS) attacks 189
- Utilization of puzzles for protection against DDoS attacks 203
- Index 217
Chapters in this book
- Frontmatter I
- Preface V
- Acknowledgments VII
- About the Editors IX
- Contents XI
- List of contributors XIII
- Impact evaluation of DDoS and Malware attack using IoT devices 1
- Understanding and implementation of machine learning using support vector machine for efficient DDoS attack detection 29
- Cryptographic method based on Catalan objects and enumerative chess problem 51
- Distributed denial-of-service attacks and mitigation in wireless sensor networks 67
- New techniques for DDoS attacks mitigation in resource-constrained networks 83
- Detection and behavioral analysis of botnets using honeynets and classification techniques 131
- Selected practical and effective techniques to combat distributed denial-of-service (DDoS) attacks 159
- Probability, queuing, and statistical perspective in the distributed denial-of-service attacks domain 173
- Frequently used machine learning algorithm for detecting the distributed denial-of-service (DDoS) attacks 189
- Utilization of puzzles for protection against DDoS attacks 203
- Index 217