AI_Adaptive_POW: An AI assisted Proof Of Work (POW) framework for DDoS defense
نویسندگان
چکیده
To protect the client–server architecture from a Distributed Denial of Service (DDoS) attack we present AI_Adaptive_POW. AI_Adaptive_POW protects an organization by injecting latency during communication generating client reputation adaptive puzzles, which need to be solved before server begins processing request. The framework adaptively tunes difficulty puzzle based on score calculated AI model. This slows down volume incoming adversarial traffic. Additionally, compels adversary incur cost per connection, hence making it expensive for sustain volumetric DDoS attack.
منابع مشابه
gore: Routing-Assisted Defense Against DDoS Attacks
We present gore, a routing-assisted defense architecture against distributed denial of service (DDoS) attacks that provides guaranteed levels of access to a network under attack. Our approach uses routing to redirect all traffic destined to a customer under attack to strategically-located gore proxies, where servers filter out attack traffic and forward authorized traffic toward its intended de...
متن کاملA Defense Framework for Flooding-based DDoS Attacks
Distributed denial of service (DDoS) attacks are widely regarded as a major threat to the Internet. A flooding-based DDoS attack is a very common way to attack a victim machine by sending a large amount of malicious traffic. Existing networklevel congestion control mechanisms are inadequate in preventing service quality from deteriorating because of these attacks. Although a number of technique...
متن کاملDual-Level Defense Framework for DDoS Attacked Network
DDoS has become one of the thorniest problems in the Internet, and aims to deny legitimate users of the services they should have. In this paper, we introduce novel dual level framework that consist of attack detection (D-LAD) and characterization scheme for defending against the DDoS attacks. The macroscopic level detectors (MaLAD) attempt to detect voluminous congestion inducing attacks which...
متن کاملMoving Target Defense: A Symbiotic Framework for AI & Security
Modern day technology has found its way into every aspect of our lives– be it the server storing our social information, the hand-held smartphones, the home security systems or a remotely monitored pacemaker. Unfortunately, this also increases the opportunity for agents with malicious intent to violate the privacy, availability or integrity of these applications. In fact, with the advancement o...
متن کاملSource-End DDoS Defense
A successful source-end DDoS defense enables early suppression of the attack and minimizes collateral damage. However, such an approach faces many challenges: (a) distributing the attack hinders detection; (b) defense systems must guarantee good service to legitimate traffic during the attack; and (c) deployment costs and false alarm levels must be sufficiently small and effectiveness must be h...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Software impacts
سال: 2022
ISSN: ['2665-9638']
DOI: https://doi.org/10.1016/j.simpa.2022.100335