DDoS Attack Tolerant Network using Hierarchical Overlay

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DDoS Attack Detection Using Cooperative Overlay Networks and Gossip Protocol

DDoS attacks have major impact on the affected networks viz. packet transmission delays, network outage, website sabotage, financial losses, legitimate-user blockage and reputation damage. Existing DDoS detection techniques are either implemented at the victim node (but the damage is already done) or at many intermediate routers which run DDoS detection algorithms, that adds additional delay an...

متن کامل

OverDoSe: A Generic DDoS Protection Service Using an Overlay Network

We present the design and implementation of OverDoSe, an overlay network offering generic DDoS protection for targeted sites. OverDoSe clients and servers are isolated at the IP level. Overlay nodes route packets between a client and a server, and regulate traffic according to the server’s instructions. Through the use of light-weight security primitives, OverDoSe achieves resilience against co...

متن کامل

Hierarchical Geometric Overlay Multicast Network

In this poster proposal, we present Bos: a hierarchical geometric overlay multicast network that is built on a 2-tier hierarchical architecture called Lightweight SuperPeer Topologies (LST) [1], [2]. Bos makes use of the geometric connectivity and Minimum Spanning Trees (MST) properties of the LST overlay network to provide efficient overlay multicast. We evaluate Bos’s performance using the la...

متن کامل

Self-stabilizing and Byzantine-Tolerant Overlay Network

Network overlays have been the subject of intensive research in recent years. The paper presents an overlay structure, S-Fireflies, that is self-stabilizing and is robust against permanent Byzantine faults. The overlay structure has a logarithmic diameter with high probability, which matches the diameter of less robust overlays. The overlay can withstand high churn without affecting the ability...

متن کامل

DDoS Tolerant Networks

The nature of the threats posed by Distributed Denial of Service (DDoS) attacks on large networks, such as the Internet, demands effective detection and response methods. These methods must be deployed not only at the edge but also at the core of the network. The DDoS Tolerant Networks technology incorporates methods to detect, characterize, and respond to DDoS attacks by computing entropy and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The KIPS Transactions:PartC

سال: 2007

ISSN: 1598-2858

DOI: 10.3745/kipstc.2007.14-c.1.045