scispace - formally typeset
Search or ask a question
Topic

DDoS mitigation

About: DDoS mitigation is a research topic. Over the lifetime, 237 publications have been published within this topic receiving 8082 citations.


Papers
More filters
Proceedings ArticleDOI
01 Oct 2016
TL;DR: The testbed is based on a P2P grid-The authors' Grid environment and aids to run DDoS attacks on existing nodes of P1P grid to use spreading, control, and attack techniques for testing of real network system.
Abstract: Distributed Denial of Service (DDoS) attacks and defence against them poses great challenge in network security. Studying of DDoS mitigation strategies, understanding of secure state of a network as well as the testing of defense appliances is the main purpose of our testbed. The testbed is based on a P2P grid-Our Grid environment and aids to run DDoS attacks on existing nodes of P2P grid to use spreading, control, and attack techniques for testing of real network system. We employ the P2P grid environment to carry out as well as to coordinate DDoS attack on the availability of services to simulate real DDoS attack launched indirectly through many compromised computing systems. The paper gives background, design and experimental practice of the testbed.

5 citations

Journal ArticleDOI
TL;DR: The potential of Variational Autoencoders to serve as a component within an intelligent security solution that differentiates between normal and malicious traffic is explored, with the classifier-based method being slightly superior to the anomaly-based one.

5 citations

Proceedings ArticleDOI
03 May 2019
TL;DR: This proposal proposed a distributed virtual honeypot model for diminishing DDoS attacks and prevent intrusion in securing CDN to be more effective reducing the cost of the system as well as maintaining the smooth delivery in geographically dispersed servers without performance degradation.
Abstract: Content Delivery Networks(CDN) is a standout amongst the most encouraging innovations that upgrade performance for its clients’ websites by diverting web demands from browsers to topographically dispersed CDN surrogate nodes. However, due to the variable nature of CDN, it suffers from various security and resource allocation issues. The most common attack which is used to bring down a whole network as well as CDN without even finding a loophole in the security is DDoS. In this proposal, we proposed a distributed virtual honeypot model for diminishing DDoS attacks and prevent intrusion in securing CDN. Honeypots are specially utilized to imitate the primary server with the goal that the attack is alleviated to the fake rather than the main server. Our proposed layer based model utilizes honeypot to be more effective reducing the cost of the system as well as maintaining the smooth delivery in geographically dispersed servers without performance degradation.

5 citations

Proceedings ArticleDOI
28 Jun 2021
TL;DR: Wang et al. as mentioned in this paper proposed a price-based resource orchestration algorithm (PROA) using game theory and convex optimization, which aims at mitigating DDoS attack while maximizing the utility of each participant.
Abstract: With the emergence of computationally intensive and delay sensitive applications, mobile edge computing(MEC) has become more and more popular. Simultaneously, MEC paradigm is faced with security challenges, the most harmful of which is DDoS attack. In this paper, we focus on the resource orchestration algorithm in MEC scenario to mitigate DDoS attack. Most of existing works on resource orchestration algorithm barely take into account DDoS attack. Moreover, they assume that MEC nodes are unselfish, while in practice MEC nodes are selfish and try to maximize their individual utility only, as they usually belong to different network operators. To solve such problems, we propose a price-based resource orchestration algorithm(PROA) using game theory and convex optimization, which aims at mitigating DDoS attack while maximizing the utility of each participant. Pricing resources to simulate market mechanisms, which is national to make rational decisions for all participants. Finally, we conduct experiment using Matlab and show that the proposed PROA can effectively mitigate DDoS attack on the attacked MEC node.

5 citations

Journal ArticleDOI
TL;DR: A Rival-Model Penalized Self-Organizing Map (RMP-SOM) enforced DDoS Attack Prevention Mechanism is proposed for the remarkable prevention of DDoS attack by utilizing the potential characteristics of SDN that focuses on the possibility of facilitating network global perspective, effective investigation of network traffic, and an enhanced process of rule updating.

5 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
85% related
Network packet
159.7K papers, 2.2M citations
84% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless ad hoc network
49K papers, 1.1M citations
83% related
Wireless network
122.5K papers, 2.1M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202119
202034
201932
201831
201728
201618