2019
DOI: 10.1109/access.2019.2930803
|View full text |Cite
|
Sign up to set email alerts
|

A New Smart Router-Throttling Method to Mitigate DDoS Attacks

Abstract: The distributed denial of service (DDoS) attack is one of the most server threats to the current Internet and brings huge losses to society. Furthermore, it is challenging to defend DDoS due to the case that the DDoS traffic can appear similar to the legitimate ones. Router throttling is an accessible approach to defend DDoS attacks. Some existing router throttling methods dynamically adjust a given threshold value to keep the server load safe. However, these methods are not ideal as they exploit the informati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 31 publications
(43 reference statements)
0
8
0
2
Order By: Relevance
“…After processing all packets in time step t, the algorithm generates the input state of the RL agent (lines [16][17][18]. Specifically, the number of generated filter rules r t , the number of HHHs generated at each hierarchy level h t , and the tensor F t .…”
Section: Rl-controlled Threshold Adaptationmentioning
confidence: 99%
“…After processing all packets in time step t, the algorithm generates the input state of the RL agent (lines [16][17][18]. Specifically, the number of generated filter rules r t , the number of HHHs generated at each hierarchy level h t , and the tensor F t .…”
Section: Rl-controlled Threshold Adaptationmentioning
confidence: 99%
“…The authors in [180] and [181] propose to adopt MARL framework for the purpose of collaborative DDoS defending. The system model involves hosts, routers, and servers.…”
Section: Ddos Attackmentioning
confidence: 99%
“…The action of each agent is to decide whether to send the aggregate traffic. The authors in [180] propose to use a fully centralized collaborative method, namely Centralized Reinforcement Learning Router Throttling (CRLRT) to train the agents. Each agent first transmits its aggregate traffic information to the central DDPG agent for joint action decision-making.…”
Section: Ddos Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…A técnica consiste em utilizar um agente, definido como um módulo computacional capaz de agir de maneira autônoma para alcançar os objetivos para os quais foi desenvolvido [Isbell et al, 2001]. O agente analisa o estado atual do ambiente, responde com uma ação e recebe em retorno uma recompensa ou uma punição pela ação tomada [Xia et al, 2019]. Com o retorno, o agente altera seus parâmetros e se adapta ao ambiente em uma velocidade proporcionalà modelagem das recompensas adquiridas e punições sofridas.…”
Section: O Aprendizado Por Reforçounclassified