Mitigating DDoS attacks using a resource sharing network
FF Khan, NM Hossain, MNH Shanto… - Proceedings of the 9th …, 2022 - dl.acm.org
Proceedings of the 9th International Conference on Networking, Systems and …, 2022•dl.acm.org
Cloud computing has gained noticeable popularity due to its ability to radically improve
computing power through the application of virtual machines. In this era of the internet,
however, security threats are increasing and it is costing many businesses. The seemingly
legitimate traffic of these application-level attacks renders the previous detection and
mitigation methods ineffective. These cyber-attacks have grown ever so sophisticated and
the detection and mitigation of these attacks has become one of the major concerns of …
computing power through the application of virtual machines. In this era of the internet,
however, security threats are increasing and it is costing many businesses. The seemingly
legitimate traffic of these application-level attacks renders the previous detection and
mitigation methods ineffective. These cyber-attacks have grown ever so sophisticated and
the detection and mitigation of these attacks has become one of the major concerns of …
Cloud computing has gained noticeable popularity due to its ability to radically improve computing power through the application of virtual machines. In this era of the internet, however, security threats are increasing and it is costing many businesses. The seemingly legitimate traffic of these application-level attacks renders the previous detection and mitigation methods ineffective. These cyber-attacks have grown ever so sophisticated and the detection and mitigation of these attacks has become one of the major concerns of security researchers and cloud service providers all around the globe. In this paper, we propose a resource sharing method to create a universal solution to mitigate DDoS attacks. We use an existing filtering method to track the IP addresses of attackers, then send them to the proxy server and delete unwanted IP packet requests by memory management system. Later, we emulate the blockchain network using 50 Nginx VM servers as a start to show the potential of our proposal. We show that our method can mitigate 66% of attacks with only 50VMs. To maximize the capability of mitigating DDoS attacks of our network, we need to increase the number of VM’s and it may take at least a few dozen developers working years on end to develop. Therefore, the goal of this paper is to lay the foundation on which one day the universal solution will be created.
ACM Digital Library
以上显示的是最相近的搜索结果。 查看全部搜索结果