2011
DOI: 10.1016/j.comnet.2010.05.001
|View full text |Cite
|
Sign up to set email alerts
|

WDA: A Web farm Distributed Denial Of Service attack attenuator

Abstract: Distributed Denial Of Service (DDoS) attacks are familiar threats to Internet users for more than ten years. Such attacks are carried out by a "Bot net", an army of zombie hosts spread around the Internet, that overwhelm the bandwidth toward their victim Web server, by sending traffic upon command. This paper introduces WDA, a novel architecture to attenuate the DDoS attacker's bandwidth. WDA is especially designed to protect Web farms. WDA is asymmetric and only monitors and protects the uplink toward the Web… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 33 publications
0
5
0
Order By: Relevance
“…Even if packet The work can be extended with real time analysis together with model evaluation. [27,28] communications are confidential, they don't give themselves to DDOS attacks. Classification engine: It is designed by using the convolutional neural network which is executed in the sensor devices and in the basestation to perform the node behaviour classification process.…”
Section: Methodsmentioning
confidence: 99%
“…Even if packet The work can be extended with real time analysis together with model evaluation. [27,28] communications are confidential, they don't give themselves to DDOS attacks. Classification engine: It is designed by using the convolutional neural network which is executed in the sensor devices and in the basestation to perform the node behaviour classification process.…”
Section: Methodsmentioning
confidence: 99%
“…Hence, such no-stationary behavior should be removed before applying CUSUM by the approach in [25]. In addition, to reduce the complex and time-consuming calculations, we consider a simple approach to apply CUSUM tox n , with e x n ¼ x n À m nÀ1 (18) where x n is the number of SYN packets in the nth sample interval and m n is an estimate of the mean SYN traffic at the nth sample interval.…”
Section: Cumulative Sum Algorithmmentioning
confidence: 99%
“…With the traffic prediction, researchers in proposed some detection schemes, which obtain good effectiveness. Moreover, there are also some other related studies such as active probing technique , Client ACK , Web farm DDoS Attack attenuator , partial completion filters , and Stream Control Transmission Protocol against DoS attacks .…”
Section: Related Workmentioning
confidence: 99%
“…type of network traffic), or given as a probabilistic distribution over some sample space (e.g. packet intervals are from a Gamma distribution [33], [34]). For instance, a HTTP denial of service attack session can be modeled by the network profile with the attributes:…”
Section: A Simulationmentioning
confidence: 99%