2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS) 2015
DOI: 10.1109/srds.2015.31
|View full text |Cite
|
Sign up to set email alerts
|

Denial of Service Elusion (DoSE): Keeping Clients Connected for Less

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…Previously, the concept about moving target defense is used to protect some targets against remote attacks, for example, moving server's location in cloud applications [8][9][10], moving virtual machine [11] and moving IP address [12]. By moving target in use frequently, the attacker cannot track its target in time and hence cannot initiate remote attacks for the targets.…”
Section: B Moving Target Defensementioning
confidence: 99%
“…Previously, the concept about moving target defense is used to protect some targets against remote attacks, for example, moving server's location in cloud applications [8][9][10], moving virtual machine [11] and moving IP address [12]. By moving target in use frequently, the attacker cannot track its target in time and hence cannot initiate remote attacks for the targets.…”
Section: B Moving Target Defensementioning
confidence: 99%
“…Also, proof-of-work puzzles slow down all clients, including the benign ones. e alternative approach (for example, DoSE [8]) is to mitigate the heavy traffic of prospective clients by installing the initial point in a content distribution network (CDN) and expanding the capacity of the network's initial point. Individual nodes in a CDN also require clients to solve puzzles to handle potentially overwhelming requests by clients.…”
Section: Existing Approachesmentioning
confidence: 99%
“…Content distribution networks promise to use a network of low-cost content distribution networks (CDN) as proxies to application servers, relying on the effectiveness of these networks [30]. e model reduces large-scale attacks on target applications [8,31]. Although CDN proxies are a step forward for deploying moving target defenses for small and medium enterprises, they can potentially be a subject of residual resolution attacks.…”
Section: Client Bootstrappingmentioning
confidence: 99%
“…Another approach uses overlay-based reactive proxies to hide the end-host or application server during end-to-end communication. [23][24][25] This architecture forwards each of the incoming connections of authenticated/ authorized users to one of the secret active proxies to serve the user's requests. When the system is under attack, the affected clients are moved to newly created proxies to avoid any further degradation due to the DDoS attack.…”
Section: Related Workmentioning
confidence: 99%