Overview
Read this article from a comprehensive knowledge base, updated and supplemented with articles reviewed by scientific committees.
Read the articleAUTHOR
-
Olivier PAUL: Doctor of Science - Senior Lecturer, Telecom Sud Paris
INTRODUCTION
For over a decade, denial-of-service attacks have been one of the most common classes of attack. This article provides an update on the subject.
Following a taxonomy of existing attacks, some figures characterizing current attacks are given. It is then shown that current architectures for combating denial of service attacks are organized according to a number of phases, and some of the associated techniques are described.
Finally, we look at a number of implementation methods, ranging from the use of equipment already present in a network, to outsourcing to a cloud-based protection service, to the use of specialized equipment.
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
CAN BE ALSO FOUND IN:
Preventing denial of service in public networks
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!