Proceedings of the 9th International Conference on Networking, Systems and Security 2022
DOI: 10.1145/3569551.3569560
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating DDoS Attacks Using a Resource Sharing Network

Abstract: Cloud computing is crucial to the internet just as air is crucial to breathing. Most users do not even come to think how the cloud architecture is one of the giant pillars on which the entire internet and all its related services depend. In recent times, cloud computing has gained noticeable popularity due to its ability to radically improve computing power through the application of virtual machines. In this era of the internet, however, security threats are increasing and it costs many businesses. The seemin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 39 publications
0
1
0
Order By: Relevance
“…Techniques like network traffic mapping, congestion control algorithms, and efficient routing protocols have been explored to improve network performance of the network interface layer. Researchers have identified and proposed mitigation mechanisms on various vulnerabilities in the network interface, such as Address Resolution Protocol (ARP) spoofing, Media Access Control (MAC) address spoofing, and Denial-of-Service (DoS) attacks [17]- [20]. Traffic sniffing, network intrusion detection, and user tracking in the network interface layer raise privacy concerns that researchers are actively addressing [21]- [24].…”
Section: Figure 1 Tcp/ip Protocol Suitementioning
confidence: 99%
“…Techniques like network traffic mapping, congestion control algorithms, and efficient routing protocols have been explored to improve network performance of the network interface layer. Researchers have identified and proposed mitigation mechanisms on various vulnerabilities in the network interface, such as Address Resolution Protocol (ARP) spoofing, Media Access Control (MAC) address spoofing, and Denial-of-Service (DoS) attacks [17]- [20]. Traffic sniffing, network intrusion detection, and user tracking in the network interface layer raise privacy concerns that researchers are actively addressing [21]- [24].…”
Section: Figure 1 Tcp/ip Protocol Suitementioning
confidence: 99%