Denial of Service (DoS) and Distributed Denial of Service (DDoS) are among the most common threats to IT security. As it does not require advanced resources, such attacks can be carried out by private individuals as well as organized groups, so-called "hacktivists". This book gives an overview and detailed description of the different kinds of attacks commonly used by hackers and it shows the challenges for IT security experts. In a practical application exercise, a DoS attack simulation is created by running the tool Low Orbit Ion Canon (LOIC) on the attacker side and a victim running an Apache 2 server. A Wireshark network utility tool is used to capture and analyze the difference between the traffic sent from the LOIC client and the normal user. In addition, to simulate a DDoS attack, a MeTuS Delphi 2.8 tool is used to create the botnet. The configurations required to run the MeTuS Delphi tool such as PortForwarding and setting up a Dynamic DNS Update Client are shown in detail. A SSYN attack is also carried out by using the tool itself. Finally, the different mitigation techniques such as Iptables, ModSecurity, and Mod Evasive are discussed and shown in practice.
Denial of Service (DoS) and Distributed Denial of Service (DDoS) are among the most common threats to IT security. As it does not require advanced resources, such attacks can be carried out by private individuals as well as organized groups, so-called "hacktivists". This book gives an overview and detailed description of the different kinds of attacks commonly used by hackers and it shows the challenges for IT security experts. In a practical application exercise, a DoS attack simulation is created by running the tool Low Orbit Ion Canon (LOIC) on the attacker side and a victim running an Apache 2 server. A Wireshark network utility tool is used to capture and analyze the difference between the traffic sent from the LOIC client and the normal user. In addition, to simulate a DDoS attack, a MeTuS Delphi 2.8 tool is used to create the botnet. The configurations required to run the MeTuS Delphi tool such as PortForwarding and setting up a Dynamic DNS Update Client are shown in detail. A SSYN attack is also carried out by using the tool itself. Finally, the different mitigation techniques such as Iptables, ModSecurity, and Mod Evasive are discussed and shown in practice.
Cloud Computing has become the global technology enabler for corporate businesses and home users relying on IT services today. Cloud Computing offers unlimited flexible computing resources, storage...
Bachelorarbeit aus dem Jahr 2017 im Fachbereich Informatik - Wirtschaftsinformatik, Note: 1,5, FOM Hochschule für Oekonomie & Management gemeinnützige GmbH, Frankfurt früher Fachhochschule,...
The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous...
Scientific Essay from the year 2018 in the subject Computer Science - Commercial Information Technology, grade: 2.5, , language: English, abstract: Cloud computing is a promising technology where...
Discover your next great read at BookLoop, Australiand online bookstore offering a vast selection of titles across various genres and interests. Whether you're curious about what's trending or searching for graphic novels that captivate, thrilling crime and mystery fiction, or exhilarating action and adventure stories, our curated collections have something for every reader. Delve into imaginative fantasy worlds or explore the realms of science fiction that challenge the boundaries of reality. Fans of contemporary narratives will find compelling stories in our contemporary fiction section. Embark on epic journeys with our fantasy and science fiction titles,
Shop Trending Books and New Releases
Explore our new releases for the most recent additions in romance books, fantasy books, graphic novels, crime and mystery books, science fiction books as well as biographies, cookbooks, self help books, tarot cards, fortunetelling and much more. With titles covering current trends, booktok and bookstagram recommendations, and emerging authors, BookLoop remains your go-to local australian bookstore for buying books online across all book genres.
Shop Best Books By Collection
Stay updated with the literary world by browsing our trending books, featuring the latest bestsellers and critically acclaimed works. Explore titles from popular brands like Minecraft, Pokemon, Star Wars, Bluey, Lonely Planet, ABIA award winners, Peppa Pig, and our specialised collection of ADHD books. At BookLoop, we are committed to providing a diverse and enriching reading experience for all.
Sign In
your cart
Your cart is empty
Menu
Search
PRE-SALES
If you have any questions before making a purchase chat with our online operators to get more information.