Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Kaur, Ramanpreeta; b; * | Sangal, Amrit Lala | Kumar, Krishanc
Affiliations: [a] Department of Computer Science and Engineering, National Institute of Technology, Jalandhar, Punjab, India | [b] Department of Information Technology, Jaypee University of Information Technology, Solan, Himachal Pradesh, India | [c] Department of Computer Science and Engineering, Shaheed Bhagat Singh State Technical Campus, Ferozpur, Punjab, India
Correspondence: [*] Corresponding author. Tel.: +91-1792-239213; E-mail: ahluwalia.raman1@gmail.com.
Abstract: Our dependence on the internet for simple and time critical applications make availability of services a top security concern. There are many attacks to threaten the availability of service, but Distributed Denial of Service (DDoS) attack constitute one of the major and the most growing threat to severely degrade the system performance. DDoS defense has been matured over time and many solutions have been proposed to solve this problem. However, most of the research is focused on detecting and blocking this attack, which results in significant disruption before regaining system control and are not suitable for critical infrastructures. So, researchers come up with an interesting alternative, overlay based defensive approaches, which try to survive the attack by providing sustainable performance to the legitimate clients in attack situations. This article provides a review of the overlay based defensive techniques by categorizing them into two classes based on their underlying strategy: Proactive and Reactive approaches. The techniques within each category are discussed along with their advantages and disadvantages, and are studied comparatively with respect to relevant performance criteria. This paper also discusses the vulnerabilities of these architectures to guide the development of more robust procedures to combat DDoS attacks.
Keywords: Overlay, distributed defense, proactive DDoS defense, reactive DDoS defense
DOI: 10.3233/JHS-170558
Journal: Journal of High Speed Networks, vol. 23, no. 1, pp. 67-91, 2017
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl