DDoS Attacks
DDoS Attacks
About this book
This book introduces readers to how vulnerabilities in computer networks can be exploited by intruders through sending mass requests beyond the capacity of the system. It explains in a practical manner how an attacker develops a tool to launch DDoS attacks of various types by compromising a large number of hosts. Looking for such patterns involves using systems that implement statistical or machine learning algorithms. This book provides adequate knowledge of such algorithms and their applications.
Details
- OL Work ID
- OL25206950W
Subjects
Denial of service attacksAttaques par saturationCOMPUTERSSecurityGeneral