Distributed Denial of Service (Ddos) Attacks: Classification, Attacks, Challenges and Countermeasures

Gupta, Brij B., Dahiya, Amrita


The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks - Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them.


  • Covers topics that describe taxonomies of the DDoS attacks in detail, recent trends and classification of defensive mechanisms on the basis of deployment location, the types of defensive action, and the solutions offering economic incentives.
  • Introduces chapters discussing the various types of DDoS attack associated with different layers of security, an attacker's motivations, and the importance of incentives and liabilities in any defensive solution.
  • Illustrates the role of fair resource-allocation schemes, separate payment mechanisms for attackers and legitimate users, negotiation models on cost and types of resources, and risk assessments and transfer mechanisms.

DDoS Attacks - Classification, Attacks, Challenges, and Countermeasures is designed for the readers who have an interest in the cybersecurity domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals who are focusing on developing defensive schemes and applications for detecting or mitigating the DDoS attacks, and faculty members across different universities.



- 詳細介紹了DDoS攻擊的分類法、最新趨勢以及根據部署位置、防禦行動類型和提供經濟激勵措施的解決方案的分類法。
- 引入了關於與安全不同層面相關的各種DDoS攻擊類型、攻擊者的動機以及任何防禦解決方案中激勵和責任的重要性的章節。
- 說明了公平資源分配方案、攻擊者和合法用戶的分開支付機制、有關成本和資源類型的談判模型,以及風險評估和轉移機制的作用。



Brij B. Gupta is Assistant Professor in the Department of Computer Engineering, National Institute of Technology Kurukshetra India. His research interests include Information Security, Cyber Security, Cloud Computing, Web Security, Intrusion Detection and Phishing.
He received his PhD degree from Indian Institute of Technology Roorkee, India in the area of Information and Cyber Security. He has published more than 250 research papers in International Journals and Conferences of high repute including IEEE, Elsevier, ACM, Springer, Wiley, Taylor & Francis, and Inderscience. He is serving as associate editor of IEEE Access, IEEE TII, Associate editor of IJICS, Inderscience and Executive editor of IJITCA, Inderscience, respectively.

Amrita Dahiya is a Research Scholar in the Department of Computer Engineering, National Institute of Technology Kurukshetra India


Brij B. Gupta是印度國立科技庫魯克設拉學院計算機工程系的助理教授。他的研究興趣包括信息安全、網絡安全、雲計算、網絡安全、入侵檢測和釣魚。他在印度羅爾基理工學院獲得了信息和網絡安全領域的博士學位。他在IEEE、Elsevier、ACM、Springer、Wiley、Taylor & Francis和Inderscience等國際知名期刊和會議上發表了250多篇研究論文。他分別擔任IEEE Access和IEEE TII的副編輯,Inderscience的IJICS的副編輯,以及Inderscience的IJITCA的執行編輯。

Amrita Dahiya是印度國立科技庫魯克設拉學院計算機工程系的研究學者。