Mitigating Denial of Service Attacks with Load Balancing

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Mitigating Distributed Denial of Service Attacks

ON MITIGATING DISTRIBUTED DENIAL OF SERVICE ATTACKS

متن کامل

Mitigating denial of service attacks: A tutorial

This tutorial describes what Denial of Service (DoS) attacks are, how they can be carried out in IP networks, and how one can defend against them. Distributed DoS (DDoS) attacks are included here as a subset of DoS attacks. A DoS attack has two phases: a deployment and an attack phase. A DoS program must first be deployed on one or more compromised hosts before an attack is possible. Mitigation...

متن کامل

Mitigating Network-Based Denial-of-Service Attacks with Client Puzzles

Over the past few years, denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks have become more of a threat than ever. These attacks are aimed at denying or degrading service for a legitimate user by any means necessary. The need to propose and research novel methods to mitigate them has become a critical research issue in network security. Recently, client puzzle protocols h...

متن کامل

Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing

Distributed Denial of Service (DDoS) attacks exploit the acute imbalance between client and server work loads to cause devastation to the service providers. We pro pose a distributed gateway architecture and a payment protocol that imposes dynamically changing prices on both network, server, and information resources in order to push some cost of initiating service requests — in terms of moneta...

متن کامل

Distributed Helios - Mitigating Denial of Service Attacks in Online Voting

One of many major issues that plagues Internet voting is the potential for a distributed denial of service attack on the voting servers. These denial of service attacks are harmful because they block voting during the downtime. In addition, most current online voting protocols are centralized with only one voting server, making such an attack likely to disenfranchise some voters. The question i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Robotics and Control (JRC)

سال: 2020

ISSN: 2715-5056,2715-5072

DOI: 10.18196/jrc.1427