DDoS Defense Mechanism by Applying Stamps using Cryptography
نویسندگان
چکیده
منابع مشابه
Collaborative Defense Mechanism Using Statistical Detection Method against DDoS Attacks
Distributed Denial-of-Service attack (DDoS) is one of the most outstanding menaces on the Internet. A DDoS attack generally attempts to overwhelm the victim in order to deny their services to legitimate users. A number of approaches have been proposed for defending against DDoS attacks accurately in real time. However, existing schemes have limits in terms of detection accuracy and delay if the...
متن کاملA moving target DDoS defense mechanism
In this paper, we introduce a moving target defense mechanism that defends authenticated clients against Internet service DDoS attacks. Our mechanism employs a group of dynamic, hidden proxies to relay traffic between authenticated clients and servers. By continuously replacing attacked proxies with backup proxies and reassigning (shuffling) the attacked clients onto the new proxies, innocent c...
متن کاملA Comprehensive Taxonomy of DDoS Attacks and Defense Mechanism Applying in a Smart Classification
-A Distributed denial of service (DDoS) attack uses multiple machines operating in concern to attack a network or site. It is the most important security problem for IT managers. These attacks are very simple organized for intruders and hence so disruptive. The detection and defense of this attack has specific importance among network specialists. In this paper a new and smart taxonomy of DDoS ...
متن کاملCollaborative Peer to Peer Defense Mechanism for DDoS Attacks
Distributed Denial of Service (DDoS) attacks are the most common and easiest attacks to propagate over internet. It causes a high degree of destruction to the network and systems resources. The destructive nature of DDoS attacks force security engineers to design defense solutions which can detect and take counter actions to defend against such attacks. In this paper, we investigated the packet...
متن کاملSource-End DDoS Defense
A successful source-end DDoS defense enables early suppression of the attack and minimizes collateral damage. However, such an approach faces many challenges: (a) distributing the attack hinders detection; (b) defense systems must guarantee good service to legitimate traffic during the attack; and (c) deployment costs and false alarm levels must be sufficiently small and effectiveness must be h...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2010
ISSN: 0975-8887
DOI: 10.5120/143-262