2015 International Conference on Green Computing and Internet of Things (ICGCIoT) 2015
DOI: 10.1109/icgciot.2015.7380646
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging the SIP load balancer to detect and mitigate DDos attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…But this method creates an additional overhead problem to the server. Researchers pay more attention on security threats introduced by the load balancer [31][32][33]. Kim et al [31] investigated the performance of SSL protocol for providing secure service in a clusterbased application server and proposed a backend forwarding method for improving server performance through better load balance.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…But this method creates an additional overhead problem to the server. Researchers pay more attention on security threats introduced by the load balancer [31][32][33]. Kim et al [31] investigated the performance of SSL protocol for providing secure service in a clusterbased application server and proposed a backend forwarding method for improving server performance through better load balance.…”
Section: Related Workmentioning
confidence: 99%
“…Kim et al [31] investigated the performance of SSL protocol for providing secure service in a clusterbased application server and proposed a backend forwarding method for improving server performance through better load balance. The authors [32] implemented a Distributed Denial of Service (DDoS) detection scheme in the load balancer. Here, the dispatcher module of Kamailio server acts as load balancer.…”
Section: Related Workmentioning
confidence: 99%
“…Akbar et al [18] also leverage Helliger Distance to low rate and multi-attributes DDoS attack. In Golait and Hubballi's work [19], the authors also detect the anomaly by generating the normal profile of SIP messages as a probability distribution.…”
Section: Related Workmentioning
confidence: 99%