5 Prevention of DOS/DDOS Attacks Through Expert Honey Mesh Security Infrastructure
CONTENTS
- 5.1 Introduction
- 5.1.1 Types of DDOS Attacks
- 5.1.1.1 Direct Flooding Attacks
- 5.1.1.2 Remote-Controlled Network Attacks
- 5.1.1.3 Reflective Flooding Attacks
- 5.1.1.4 Protocol Violation Attacks
- 5.1.1.5 Fragmentation Attacks
- 5.1.1.6 Network Infrastructure Attacks
- 5.2 Working of DDOS Attacks
- 5.2.1 Using a Botnet “Botnet” to Launch a DDOS Attack
- 5.2.2 Prevention Measures of DDOS Attacks
- 5.2.3 Never Overestimate the Defenses of the Network
- 5.2.4 Create a Reference Model to Better Identify Active Attacks
- 5.2.5 Apply the Latest Patches of Suppliers
- 5.2.6 Secure the IoT Devices
Get Information Security Handbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.