Mitigating Denial-of-Service Attacks Using Secure Service Overlay Model
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 8, Issue 9
Abstract
Denial of service (DoS) and Distributed Denial of Service (DDoS) attacks continue to threaten the reliability of networking systems. Previous approaches for protecting networks from DoS attacks are reactive in that they wait for an attack to be launched before taking appropriate measures to protect the network. This leaves the door open for other attacks that use more sophisticated methods to mask their traffic. A secure overlay services (SOS) architecture has been proposed to provide reliable communication between clients and a target under DoS attacks. The SOS architecture employs a set of overlay nodes arranged in three hierarchical layers that controls access to the target. We propose an architecture called secure overlay services (SOS) that proactively prevents denial of service (DoS) attacks, which works toward supporting emergency services, or similar types of communication. The architecture uses a combination of secure overlay tunneling, routing via consistent hashing, and filtering. We reduce the probability of successful attacks by: 1) performing intensive filtering near protected network edges, pushing the attack point into the core of the network, where high-speed routers can handle the volume of attack traffic and 2) introducing randomness and anonymity into the forwarding architecture, making it difficult for an attacker to target nodes along the path to a specific SOS-protected destination. Using simple analytical models, we evaluate the likelihood that an attacker can successfully launch a DoS attack against an SOS protected network. Our analysis demonstrates that such an architecture reduces the likelihood of a successful attack to minuscule levels.
Authors and Affiliations
Shalaka S. Chowriwar , Madhulika S. Mool , Prajyoti P. Sabale , Sneha S. Parpelli , Mr. Nilesh Sambhe
“The Potential Pozzolanic Activity of Different Ceramic Waste Powder as Cement Mortar Component (Strength Activity Index)”
Under the strong contemporary demand for modern and environmental friendly materials, natural pozzolan can be proved to be such material and several researchers have focused their research efforts in using it as a partia...
Enhancement of Speech Compression Technique Using Wavelet Transforms With Parallel Processing and Fusion
— The Discrete Wavelet Transform is the most powerful and new Since speech signal contains a large number of redundant information, how to compress high quality speech maintaining transparent quality at low bit rat...
Design and Verification of Serial Peripheral Interface
The objective of this project is to design SPI Master Core using Verilog and verify the code using system verilog. Serial Peripheral Interface (SPI) is an interface that facilitates the transfer of synchronous seri...
A Review on Optimization of Finite Element Modelling for Structural Analysis of Pressure Vessel
It is important for every engineer to analyze and design the pressure vessel that will provide safety, durability and serviceability to the company. Accomplishing this task will require knowledge of parameters that affec...
Defect Detection in Alloy Steel Surface Using Nonsubsampled Contourlet Transform
Surface defect detection of metallic surfaces is a major challenge in any manufacturing industry. In this paper, an automated system to classify alloy steel surface based on Nonsubsampled Contourlet Transform (NSCT) is p...