Nova Publishers
My Account Nova Publishers Shopping Cart
HomeBooksSeriesJournalsReference CollectionseBooksInformationSalesImprintsFor Authors
            
  Top » Catalog » Books » Computer Science and Robotics » Horizons in Computer Science Research. Volume 4 » My Account  |  Cart Contents  |  Checkout   
Quick Find
  
Use keywords to find the product you are looking for.
Advanced Search
What's New? more
Fetal Alcohol Syndrome: Recognition, Differential Diagnosis and Long-Term Effects
$82.00
Shopping Cart more
0 items
Information
Shipping & Returns
Privacy Notice
Conditions of Use
Contact Us
Notifications more
NotificationsNotify me of updates to Cryptographic Puzzles and Game Theory against DoS and DDos Attacks in Networks (pp.271-288)
Tell A Friend
 
Tell someone you know about this product.
Cryptographic Puzzles and Game Theory against DoS and DDos Attacks in Networks (pp.271-288) $100.00
Authors:  (Antonis Michalas, Nikos Komninos, Neeli R.. Prasad, Athens Information Technology, Peania, Athens, Greece, and others)
Abstract:
In this chapter, we present techniques to defeat Denial of Service (DoS) and Distributed
Denial of Service (DDoS) attacks. In the first part, we describe client puzzle
techniques that are based on the idea of computationally exhausting a malicious user
when he attempts to launch an attack. In the second part we are introducing some
basic principles of game theory and we discuss how game theoretical frameworks can
protect computer networks. Finally, we show techniques that combine client puzzles
with game theory in order to provide DoS and DDoS resilience. 


Available Options:
Version:
Special Focus Titles
01.Violent Communication and Bullying in Early Childhood Education
02.Cultural Considerations in Intervention with Women and Children Exposed to Intimate Partner Violence
03.Chronic Disease and Disability: The Pediatric Lung
04.Fruit and Vegetable Consumption and Health: New Research
05.Fire and the Sword: Understanding the Impact and Challenge of Organized Islamism. Volume 2

Nova Science Publishers
© Copyright 2004 - 2020

Cryptographic Puzzles and Game Theory against DoS and DDos Attacks in Networks (pp.271-288)