Jump to ContentJump to Main Navigation
Access ContestedSecurity, Identity, and Resistance in Asian Cyberspace$
Users without a subscription are not able to see the full content.

Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain

Print publication date: 2011

Print ISBN-13: 9780262016780

Published to MIT Press Scholarship Online: August 2013

DOI: 10.7551/mitpress/9780262016780.001.0001

Show Summary Details
Page of

PRINTED FROM MIT PRESS SCHOLARSHIP ONLINE (www.mitpress.universitypressscholarship.com). (c) Copyright The MIT Press, 2021. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in MITSO for personal use.date: 23 September 2021

Interconnected Contests

Interconnected Contests

Distributed Denial of Service Attacks and Other Digital Control Measures in Asia

(p.133) 7 Interconnected Contests
Access Contested

Hal Roberts

Ethan Zuckerman

John Palfrey

The MIT Press

This chapter focuses on the use of distributed denial of service (DDoS) attacks by states to control online content. An example of the use of DDoS by Vietnamese government to make a website, bauxitevietnam.info, created to protest the bauxite mining in the Central Highlands of Vietnam, inaccessible to people, is presented. The chapter presents surveys according to which DDoS attacks exist within larger attacks of a different nature and vary in nature and magnitude. Correlation between DDoS, filtering, defacement, and intrusion attacks is explored through the example of a dual attack on a Burmese independent Web site. The chapter presents surveys on the responses to DDoS attacks including blackholing the Internet protocol address, downgrading content, and filtering out attack traffic.

Keywords:   DDoS attack, bauxitevietnam.info, defacement, intrusion attack, blackholing, Internet protocol

MIT Press Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs, and if you can't find the answer there, please contact us.