A Method for Deploying Distributed Denial of Service Attack Defense Strategies on Edge Servers Using Reinforcement Learning
نویسندگان
چکیده
منابع مشابه
Denial of Service Attack and Defense
In this chapter, we firstly review the short history of denial of service (DoS) and distributed denial of service (DDoS) attacks. We further explore the reasons why the current cyberspace is a heaven for cyber criminals, such as DDoS attackers. We present the challenges of the DDoS related research fields from various aspects, and discuss the possible research methods and strategies to serve th...
متن کاملA New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test
This study has proposed a new detection method for DDoS attack traffic based on two-sample t-test. We first investigate the statistics of normal SYN arrival rate (SAR) and confirm it follows normal distribution. The proposed method identifies the attack by testing 1) the difference between incoming SAR and normal SAR, and 2) the difference between the number of SYN and ACK packets. The experime...
متن کاملA Fuzzy Logic based Defense Mechanism against Distributed Denial of Service Attack in Cloud Computing Environment
Cloud defines a new age of computing solution that provides services to customers with its unique features of agility and multi-tenancy. As the critical resources are hosted at cloud provider’s end, security is a big challenge in cloud computing. If the cloud environment is compromised and attackers get the access of core data centers, the availability of the critical resources becomes a big co...
متن کاملA Probabilistic Defense Mechanism Against Distributed Denial of Service Attacks
Distributed denial of service attacks form a prolific threat to any form of client-server computing, as used, for instance, by e-commerce businesses. The resources of standard servers are quickly consumed under such an attack, making them unavailable to legitimate users. We describe and analyze a defense mechanism for such servers. We prove that this mechanism favors benign users, making the se...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.2989353