Comparing DDoS Mitigation Techniques

ثبت نشده
چکیده

Distributed Denial of Service (DDoS) attacks are becoming more frequent and the size of these attacks is increasing. This increases the load on the networks of Internet Service Providers (ISPs), while also taking websites offline. Nowadays, many companies rely on Internet applications (banking, communication) for their core business. As such, outages of Internet applications can have a big financial impact on companies that provide these services. Therefore, the market for DDoS Protection Services (DPSs) is rising. Several companies provide services to protect against DDoS attacks. These services do not all work the same. Some companies provide services such as a reverse proxy-based solution or a solution that relies on the Border Gateway Protocol (BGP), the routing protocol of the Internet. This raises some questions: why are different underlying techniques used and what is the difference between them? This paper compares commonly used methods of mitigating DDoS attacks, which will provide a thorough understanding of the advantages and disadvantages of these techniques.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Router Based Mechanism for Mitigation of DDoS Attack- A Survey

Today most of the activities like trade, e-commerce are dependent on the availability of Internet. The growing use of internet services in the past few years have facilitated increase in distributed denial of service attack. Due to DDos attacks, caused by malicious hosts secured data communication over the internet is very difficult to achieve and is the need of the hour. DDos attacks are one o...

متن کامل

Service resizing for quick DDoS mitigation in cloud computing environment

Current trends in distributed denial of service (DDoS) attacks show variations in terms of attack motivation, planning, infrastructure, and scale. “DDoS-for-Hire” and “DDoS mitigation as a Service” are the two services, which are available to attackers and victims, respectively. In this work, we provide a fundamental difference between a “regular” DDoS attack and an “extreme” DDoS attack. We co...

متن کامل

Critical Review of Economical Denial of Sustainability (EDoS) Mitigation Techniques

Corresponding Author: Parminder Singh Bawa National Advanced IPv6 Centre, Universiti Sains Malaysia, Penang, Malaysia Email: [email protected] Abstract: Many organizations and service providers have started shifting from traditional server-cluster infrastructure to cloud-based infrastructure. The threat of Distributed Denial of Service (DDoS) attack continues to wreak havoc in these cloud i...

متن کامل

Routing Around Congestion Defeating DDoS Attacks and Adverse Network Conditions via Reactive BGP Routing

In this paper, we present Nyx, the first system to both effectively mitigate modern Distributed Denial of Service (DDoS) attacks regardless of the amount of traffic under adversarial control and function without outside cooperation or an Internet redesign. Nyx approaches the problem of DDoS mitigation as a routing problem rather than a filtering problem. This conceptual shift allows Nyx to avoi...

متن کامل

NetBouncer: Client-legitimacy-based High-performance DDoS Filtering

We describe "NetBouncer", an approach and set of technologies for providing practical and highperformance defenses against distributed denial-ofservice (DDoS) attacks. The central innovation in the NetBouncer approach to filtering and mitigating DDoS attacks is the ability to distinguish legitimate traffic from illegitimate ones so as to enable the discarding of only illegitimate traffic. In pa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016