DDoS Attack Tolerant Network using Hierarchical Overlay
نویسندگان
چکیده
منابع مشابه
DDoS Attack Detection Using Cooperative Overlay Networks and Gossip Protocol
DDoS attacks have major impact on the affected networks viz. packet transmission delays, network outage, website sabotage, financial losses, legitimate-user blockage and reputation damage. Existing DDoS detection techniques are either implemented at the victim node (but the damage is already done) or at many intermediate routers which run DDoS detection algorithms, that adds additional delay an...
متن کاملOverDoSe: A Generic DDoS Protection Service Using an Overlay Network
We present the design and implementation of OverDoSe, an overlay network offering generic DDoS protection for targeted sites. OverDoSe clients and servers are isolated at the IP level. Overlay nodes route packets between a client and a server, and regulate traffic according to the server’s instructions. Through the use of light-weight security primitives, OverDoSe achieves resilience against co...
متن کاملHierarchical Geometric Overlay Multicast Network
In this poster proposal, we present Bos: a hierarchical geometric overlay multicast network that is built on a 2-tier hierarchical architecture called Lightweight SuperPeer Topologies (LST) [1], [2]. Bos makes use of the geometric connectivity and Minimum Spanning Trees (MST) properties of the LST overlay network to provide efficient overlay multicast. We evaluate Bos’s performance using the la...
متن کاملSelf-stabilizing and Byzantine-Tolerant Overlay Network
Network overlays have been the subject of intensive research in recent years. The paper presents an overlay structure, S-Fireflies, that is self-stabilizing and is robust against permanent Byzantine faults. The overlay structure has a logarithmic diameter with high probability, which matches the diameter of less robust overlays. The overlay can withstand high churn without affecting the ability...
متن کاملDDoS Tolerant Networks
The nature of the threats posed by Distributed Denial of Service (DDoS) attacks on large networks, such as the Internet, demands effective detection and response methods. These methods must be deployed not only at the edge but also at the core of the network. The DDoS Tolerant Networks technology incorporates methods to detect, characterize, and respond to DDoS attacks by computing entropy and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The KIPS Transactions:PartC
سال: 2007
ISSN: 1598-2858
DOI: 10.3745/kipstc.2007.14-c.1.045