Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Distributed Denial of Service (DDoS)

Handbook of Research on Wireless Security
DDOS is a type of DoS attack conducted by using multiple sources that are distributed throughout the network.
Published in Chapter:
Vulnerability Analysis and Defenses in Wireless Networks
Lawan A. Mohammed (King Fahd University of Petroleum and Minerals, Saudi Arabia) and Biju Issac (Swinburne University of Technology – Sarawak Campus, Malaysia)
Copyright: © 2008 |Pages: 16
DOI: 10.4018/978-1-59904-899-4.ch010
Abstract
This chapter shows that the security challenges posed by the 802.11 wireless networks are manifold and it is therefore important to explore the various vulnerabilities that are present with such networks. Along with other security vulnerabilities, defense against denial of service attacks is a critical component of any security system. Unlike wired networks where denial of service attacks has been extensively studied, there is a lack of research for preventing such attacks in wireless networks. In addition to various vulnerabilities, some factors leading to different types of denial of service (DoS) attacks and some defense mechanisms are discussed in this chapter. This can help to better understand the wireless network vulnerabilities and subsequently more techniques and procedures to combat these attacks may be developed by researchers.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Artificial Intelligence-Based Solutions for Cyber Security Problems
DDoS (distributed denial of service) occurs by starting the attack from a large number of different sources, not from one source. botnets consisting of devices called zombies are used to carry out DDoS attacks. These zombie devices are electronic devices captured by hackers and used for attackers' purposes. DDoS attacks are more successful than Dos attacks in achieving what is desired. Since it is carried out from multiple sources towards the target, it becomes difficult to identify the main source.
Full Text Chapter Download: US $37.50 Add to Cart
Employer Branding and Internet Security
Form of electronic attack involving multiple computers, which send repeated HTTP requests or pings to a server to load it down and render it inaccessible for a period of time.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy and Security in Wireless Devices for the Internet of Things
DDOS is the extension of DOS. In DDOS the attacker sends the unnecessary garbage request to the server with multiple IoT devices so that the server gets down faster than the DOS technique.
Full Text Chapter Download: US $37.50 Add to Cart
Fundamental Concepts of Cloud Computing
This is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the internet.
Full Text Chapter Download: US $37.50 Add to Cart
Intelligent Automation Using Machine and Deep Learning in Cybersecurity of Industrial IoT: CCTV Security and DDoS Attack Detection
In DDoS attack, the incoming network traffic affects a target (e.g., server) from many different compromised sources. Consequently, online services are unavailable due to the attack. The target's resources are affected with different malicious network-based techniques (e.g., flood of network traffic packets).
Full Text Chapter Download: US $37.50 Add to Cart
Distributed Denial of Service Attacks in Networks
an attacker compromises several hosts on the Internet and then uses these compromised computers to launch coordinated attacks on victim machines.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR