2016 IEEE Conference on Communications and Network Security (CNS) 2016
DOI: 10.1109/cns.2016.7860486
|View full text |Cite
|
Sign up to set email alerts
|

A moving target defense approach to mitigate DDoS attacks against proxy-based architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 47 publications
(35 citation statements)
references
References 13 publications
0
35
0
Order By: Relevance
“…The strategic stability of various categories like proactive server movement, delayed attack timing and suspected insider blocking are blocked effectively through the concepts of MTD. New client-to-proxy assignment strategy [11] is proposed which employs MTD which helps in isolating the compromised clients thereby reduces the impact of attacks. The experiment is validated both theoretically and through simulations which limits effectively the number of proxies discovered by an attacker and isolates malicious clients.…”
Section: Related Workmentioning
confidence: 99%
“…The strategic stability of various categories like proactive server movement, delayed attack timing and suspected insider blocking are blocked effectively through the concepts of MTD. New client-to-proxy assignment strategy [11] is proposed which employs MTD which helps in isolating the compromised clients thereby reduces the impact of attacks. The experiment is validated both theoretically and through simulations which limits effectively the number of proxies discovered by an attacker and isolates malicious clients.…”
Section: Related Workmentioning
confidence: 99%
“…In [26], Jia et al presented a successor of MOTAG, that supports authenticated and anonymous clients and is deployed in a cloud-based environment. Both MTD approaches [24]- [26] were only simulated in MATLAB and are vulnerable to the proxy harvesting attack [27].…”
Section: Related Workmentioning
confidence: 99%
“…Wide area networks may be able to provide such a sufficiently large number of different routes, but this is clearly not the case in a local network, which usually manages to prevent loops in topology and has much less redundant traversing paths. Venkatesan et al [16] proposed an MTD approach utilizing proxy. In their approach, the proxy is not software on end-hosts, but a standalone device in the network acting as a traffic filter for mitigating DDoS attacks.…”
Section: Similar Workmentioning
confidence: 99%