Skip to main content
  • 1566 Accesses

Abstract

Contemporary society has grown increasingly reliant on information and the systems used to store, process, and communicate that information. Consequently very few aspects of modern-day life would continue to operate smoothly in the absence of functioning information and communications systems. This increasing societal dependence on information and communications technologies in general and communications networks in particular is most obvious when the delivery of services via these systems and networks is disrupted even for relatively short periods. Such situations in which access to networked services by legitimate customers or clients is deliberately disrupted are collectively categorised as ‘denial of service’ or DoS attacks. These are the subject of the ensuing discussion.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://catless.ncl.ac.uk/Risks/23.35.html\#subj10.1

  2. 2.

    http://catless.ncl.ac.uk/Risks/22.88.html\#subj5

  3. 3.

    http://catless.ncl.ac.uk/Risks/22.52.html\#subj7.1

  4. 4.

    http://money.cnn.com/2010/12/09/technology/amazon_wikileaks_attack/index.htm?source=cnn_bin&hpt=Sbin

References

  1. Carl, G., G. Kesidis, R.R. Brooks, and S. Rai. 2006. Denial-of-service attack – Detection techniques. IEEE Internet Computing 10(1): 82–89.

    Article  Google Scholar 

  2. Garber, L. 2000. Denial-of-service attacks rip the internet. Computer33(4): 12–17.

    Article  Google Scholar 

  3. Gligor, V.D., M. Blaze, and J. Ioannidis. 2000. Denial of service – Panel discussion. In Security Protocols Workshop, Lecture notes in computer science, vol. 2133, 194–203. Springer, Berlin.

    Google Scholar 

  4. Grice, C. 2000. How a basic attack crippled yahoo. http://news.cnet.com/2100-1023-236621.html. Accessed 16 Feb 2011.

  5. Nazario, J. 2011. Political DDoS: Estonia and beyond (invited talk). In 17th USENIX Security Symposium, San Jose, July 2008. http://streaming.linux-magazin.de/events/usec08/tech/archive/jnazario/. Accessed 16 Feb 2011.

  6. Singhal, A., T. Winograd, and K. Scarfone. 2007. Guide to Secure Web Services – Recommendations of the National Institute of Standards and Technology. National Institute of Standards and Technology, Gaithersburg.

    Google Scholar 

  7. Zuckerman, M.J. 2000. How the government failed to stop the world’s worst internet attack. USA Today, p. 1A.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. V. Raghavan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer India Pvt. Ltd.

About this chapter

Cite this chapter

Raghavan, S.V., Dawson, E. (2011). Introduction. In: Raghavan, S., Dawson, E. (eds) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks. Springer, India. https://doi.org/10.1007/978-81-322-0277-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-0277-6_1

  • Published:

  • Publisher Name: Springer, India

  • Print ISBN: 978-81-322-0276-9

  • Online ISBN: 978-81-322-0277-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics