Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is DDoS

Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance
An attempt to make a machine or network resource unavailable to its intended users.
Published in Chapter:
Fighting Cybercrime and Protecting Privacy: DDoS, Spy Software, and Online Attacks
Javier Valls-Prieto (University of Granada, Spain)
DOI: 10.4018/978-1-4666-6324-4.ch010
Abstract
This chapter is about the use of large-scale databases that has increased considerably in the last two years. It is a powerful tool to predict future situations that may affect society. The use of an environmental scanner to fight cybercrime—as an organized crime—is the project for using this technique of large-scale databases to try to guarantee the security against the risk of new, developing forms of criminal activities. On the other hand, the use of large-scale databases utilizes a great amount of personal data to try to predict where and how organized crime or new forms of criminality will develop. This means that we have to evaluate the interests of security of society and the privacy of the person, and we have to find the way to balance both in a democratic society. There are important ethical issues to be considered in the employment of this new and unregulated instrument.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
An Analysis of Industry 4.0
A means of overloading servers using a range of protocols in order to successfully starve the victim of computational resources and the ability to operate effectively.
Full Text Chapter Download: US $37.50 Add to Cart
Social Research Methods in Cybersecurity: From Criminology to Industrial Cybersecurity
The use of malicious software to organize automated attacks through IoT devices, specifically denial of service attacks (DDoS), is currently another effective new formula of cyber-activism, in which a large volume of traffic is directed towards a specific service or website (normally governmental but not exclusively) to make it inoperative.
Full Text Chapter Download: US $37.50 Add to Cart
Detection of DDoS Attack Using Machine Learning Techniques in Software Defined Networking
Distributed denial of service attack is a deliberate attempt to flood the target or its surrounding infrastructure with Internet traffic in order to maliciously disrupt the regular traffic of a targeted server, service, or network. By using numerous compromised computer systems as sources of attack traffic, DDoS attacks are made effective.
Full Text Chapter Download: US $37.50 Add to Cart
Cyberwar: Its Psychological Impact on Employees and Consequences for Organizations
In attacks known as distributed denial of service, the attackers render the resources unavailable to the users who are allowed to access them.
Full Text Chapter Download: US $37.50 Add to Cart
Multi-Aspect DDOS Detection System for Securing Cloud Network
A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR