Comparing DDoS Mitigation Techniques
ثبت نشده
چکیده
Distributed Denial of Service (DDoS) attacks are becoming more frequent and the size of these attacks is increasing. This increases the load on the networks of Internet Service Providers (ISPs), while also taking websites offline. Nowadays, many companies rely on Internet applications (banking, communication) for their core business. As such, outages of Internet applications can have a big financial impact on companies that provide these services. Therefore, the market for DDoS Protection Services (DPSs) is rising. Several companies provide services to protect against DDoS attacks. These services do not all work the same. Some companies provide services such as a reverse proxy-based solution or a solution that relies on the Border Gateway Protocol (BGP), the routing protocol of the Internet. This raises some questions: why are different underlying techniques used and what is the difference between them? This paper compares commonly used methods of mitigating DDoS attacks, which will provide a thorough understanding of the advantages and disadvantages of these techniques.
منابع مشابه
Router Based Mechanism for Mitigation of DDoS Attack- A Survey
Today most of the activities like trade, e-commerce are dependent on the availability of Internet. The growing use of internet services in the past few years have facilitated increase in distributed denial of service attack. Due to DDos attacks, caused by malicious hosts secured data communication over the internet is very difficult to achieve and is the need of the hour. DDos attacks are one o...
متن کاملService resizing for quick DDoS mitigation in cloud computing environment
Current trends in distributed denial of service (DDoS) attacks show variations in terms of attack motivation, planning, infrastructure, and scale. “DDoS-for-Hire” and “DDoS mitigation as a Service” are the two services, which are available to attackers and victims, respectively. In this work, we provide a fundamental difference between a “regular” DDoS attack and an “extreme” DDoS attack. We co...
متن کاملCritical Review of Economical Denial of Sustainability (EDoS) Mitigation Techniques
Corresponding Author: Parminder Singh Bawa National Advanced IPv6 Centre, Universiti Sains Malaysia, Penang, Malaysia Email: [email protected] Abstract: Many organizations and service providers have started shifting from traditional server-cluster infrastructure to cloud-based infrastructure. The threat of Distributed Denial of Service (DDoS) attack continues to wreak havoc in these cloud i...
متن کاملRouting Around Congestion Defeating DDoS Attacks and Adverse Network Conditions via Reactive BGP Routing
In this paper, we present Nyx, the first system to both effectively mitigate modern Distributed Denial of Service (DDoS) attacks regardless of the amount of traffic under adversarial control and function without outside cooperation or an Internet redesign. Nyx approaches the problem of DDoS mitigation as a routing problem rather than a filtering problem. This conceptual shift allows Nyx to avoi...
متن کاملNetBouncer: Client-legitimacy-based High-performance DDoS Filtering
We describe "NetBouncer", an approach and set of technologies for providing practical and highperformance defenses against distributed denial-ofservice (DDoS) attacks. The central innovation in the NetBouncer approach to filtering and mitigating DDoS attacks is the ability to distinguish legitimate traffic from illegitimate ones so as to enable the discarding of only illegitimate traffic. In pa...
متن کامل