Article Details

Effect of Distributed Denial of Service (Ddos) Attacks under Different Number of Attackers and Different Node Mobility | Original Article

Kamlesh .*, Anju Dhull, in International Journal of Information Technology and Management | IT & Management


In risk management one must understand the most important risks and decide how to mitigate them. Risks can be either accepted as such, mitigated by using one or more defense mechanisms, or transferred to third parties (such as with insurances). The primary goal is to ensure business continuity and, at the same time, keep the associated costs at a reasonable level. Effective risk management, however, is not possible without a good knowledge in existing attack mechanisms and available defense mechanisms. A widely exploited attack mechanism can be associated a high risk requiring effective mitigation. Completely different actions should be taken in a risk management process when no defense mechanisms exist against a specific attack, and when effective defense mechanisms can be easily deployed.