Saturday, 6 August 2011

Automated Alerting for Black Hole Routing

Automated Alerting for Black Hole Routing
Author: Vinay Puri
Edition:
Binding: Kindle Edition
ISBN: B007W64CWW



Automated Alerting for Black Hole Routing


Distributed/Denial of Service (D/DoS) attacks are the most common and easy-to-launch attacks against a computer or network. Get Automated Alerting for Black Hole Routing computer books for free.
Once a D/DoS attack is recognized, there are several methods available to mitigate its impact. One of the methods is to drop the attacker's traffic at the edge of the network via Null Routing-also called Black Hole Routing (BHR). BHR is more efficient than the creation and processing of access control lists. Prior work has validated the effectiveness of BHR in mitigating D/DoS attacks in a setting where the defense is activated manually. This research built upon that work and developed a proof-of-concept automated BHR process integrated with Snort, an open source Intrusion Detection System (IDS), to facilitate a faster Check Automated Alerting for Black Hole Routing our best computer books for 2013. All books are available in pdf format and downloadable from rapidshare, 4shared, and mediafire.

download

Automated Alerting for Black Hole Routing Free


Once a D/DoS attack is recognized, there are several methods available to mitigate its impact. One of the methods is to drop the attacker's traffic at the edge of the network via Null Routing-also called Black Hole Routing (BHR). BHR is more efficient than the creation and processing of access control lists. Prior work has validated the effectiveness of BHR in mitigating D/DoS attacks in a setting where the defense is activated manually nce a D/DoS attack is recognized, there are several methods available to mitigate its impact. One of the methods is to drop the attacker's traffic at the edge of the network via Null Routing-also called Black Hole Routing (BHR). BHR is more efficient than the creation and processing of access control lists. Prior work has validated the effectiveness of BHR in mitigating D/DoS attacks in a setting where the defense is activated manually. This research built upon that work and developed a proof-of-concept automated BHR process integrated with Snort, an open source Intrusion Detection System (IDS), to facilitate a faster

Related Computer Books


Nmap Cookbook: The Fat-free Guide to Network Scanning


Nmap(r) Cookbook: The fat-free guide to network scanning provides simplified coverage of network scanning features available in the Nmap suite of utilities. Every Nmap feature is covered with visual examples to help you quickly understand and identif

No comments:

Post a Comment