Skip to main content
  • Book
  • © 2011

An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks

Critical Information Infrastructure Protection

  • Helps in the overall understanding of the Critical Information Infrastructure Protection Problem

  • Helps in the design of a monitoring system

  • Helps in Policy formulation

  • Helps in Legal Framework Design

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 159.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (8 chapters)

  1. Front Matter

    Pages i-xv
  2. Introduction

    • S. V. Raghavan, E. Dawson
    Pages 1-7
  3. Background

    • A. B. Tickle, E. Ahmed, S. M. Bhaskar, G. Mohay, S. Panichprecha, S. V. Raghavan et al.
    Pages 9-40
  4. Policy and Law: Denial of Service Threat

    • W. J. Caelli, S. V. Raghavan, S. M. Bhaskar, J. Georgiades
    Pages 41-114
  5. DDoS Testbed

    • D. Schmidt, S. M. Shalinie
    Pages 115-129
  6. Detection and Mitigation of High-Rate Flooding Attacks

    • G. Mohay, E. Ahmed, S. Bhatia, A. Nadarajan, B. Ravindran, A. B. Tickle et al.
    Pages 131-181
  7. Cryptographic Approaches to Denial-of-Service Resistance

    • C. Boyd, J. Gonzalez-Nieto, L. Kuppusamy, H. Narasimhan, C. Pandu Rangan, J. Rangasamy et al.
    Pages 183-238
  8. Denial of Service Defence Appliance for Web Services

    • S. Suriadi, A. Clark, H. Liu, D. Schmidt, J. Smith, D. Stebila
    Pages 239-298
  9. DoS Vulnerabilities in IPv6

    • J. Smith, E. Ahmed, C. Chellappan, S. P. Meenakshi, S. V. Raghavan, S. Suriadi et al.
    Pages 299-321
  10. Back Matter

    Pages 323-345

About this book

Around the globe, nations face the problem of protecting their Critical Information Infrastructure, normally referred to as Cyber Space. In this monograph, we capture FIVE different aspects of the problem; High speed packet capture, Protection through authentication, Technology Transition, Test Bed Simulation, and Policy and Legal Environment. The monograph is the outcome of over three years of cooperation between India and Australia.

Editors and Affiliations

  • , Department of Computer Science and Engin, Indian Institute of Technology Madras, C, Chennai, India

    S.V. Raghavan

  • , Information Security Institute, Queensland University of Technology, Brisbane, Australia

    E Dawson

About the editors

Professor S V Raghavan is currently Scientific Secretary, Office of the Principal Scientific Advisor to Government of India. He is also a full Professor in the prestigious Indian Institute of technology Madras, Chennai. Professor Raghavan is the Chief Architect and the Chairman, Technical Advisory Committee to National Knowledge Network (NKN), a Government of India initiative to interconnect and integrate 1500 knowledge institutions in India and integrate NKN with global science through dedicated international linkages in a seamless manner. His current research interests are Technology, Health, and Education, where he has significant contributions in the recent years. Location technologies, Evolutionary addressing, Discovering Redundant multi-paths, IR Imaging for Breast Cancer, and pedagogy based adaptive and reusable learning modules are some of them. Professor Raghavan is the Project Director of the Indo-Australian Joint Project to understand Distributed Denial of Service Attacks on Critical Information Infrastructure. Professor Ed Dawson is a Professor Emeritus in the Information Security Institute. From 2005 until 2007, he was the Research Director of the Information Security Institute (ISI). Prior to the formation of the ISI, he was the Director of the Information Security Research Centre (ISRC). He has research interests in all aspects of cryptology especially related to the design and analysis of encryption algorithms and their application to e-commerce and secure communications. He has published over 250 research papers. Over the last five years, he has received over $7,000,000 in external funding. Professor Dawson was the Vice-President of the International Association of Cryptology Research (2008 – 2010) and the node leader of the Information Security component of the Australian Research Council networks, Research Networks for a Security Australia.

Bibliographic Information

  • Book Title: An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks

  • Book Subtitle: Critical Information Infrastructure Protection

  • Editors: S.V. Raghavan, E Dawson

  • DOI: https://doi.org/10.1007/978-81-322-0277-6

  • Publisher: Springer New Delhi

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer India Pvt. Ltd. 2011

  • Hardcover ISBN: 978-81-322-0276-9Published: 06 October 2011

  • Softcover ISBN: 978-81-322-1713-8Published: 30 November 2013

  • eBook ISBN: 978-81-322-0277-6Published: 29 September 2011

  • Edition Number: 1

  • Number of Pages: XVI, 348

  • Topics: Input/Output and Data Communications, Systems and Data Security, Control Structures and Microprogramming

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 159.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access