2014
DOI: 10.1145/2567926
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating DoS Attacks Using Performance Model-Driven Adaptive Algorithms

Abstract: Denial of Service (DoS) attacks overwhelm online services, preventing legitimate users from accessing a service, often with impact on revenue or consumer trust. Approaches exist to filter network-level attacks, but application-level attacks are harder to detect at the firewall. Filtering at this level can be computationally expensive and difficult to scale, while still producing false positives that block legitimate users.This article presents a model-based adaptive architecture and algorithm for detecting DoS… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…These models are used at design time to determine initial resource provisioning given assumptions about the environment, and at run time to determine correct provisioning to new workflows and configurations. A similar approach is used [2] to deal with Denial of Service attacks, where performance models are used to determine whether to divert traffic to a checkpoint, which then issues a challenge to determine if the traffic originates from a bot. In this case the soundness of the mathematical models and their updating and use at run time provide evidence that performance goals will be met.…”
Section: Evidence Types For Use In Assurance Case Decompositionmentioning
confidence: 99%
See 1 more Smart Citation
“…These models are used at design time to determine initial resource provisioning given assumptions about the environment, and at run time to determine correct provisioning to new workflows and configurations. A similar approach is used [2] to deal with Denial of Service attacks, where performance models are used to determine whether to divert traffic to a checkpoint, which then issues a challenge to determine if the traffic originates from a bot. In this case the soundness of the mathematical models and their updating and use at run time provide evidence that performance goals will be met.…”
Section: Evidence Types For Use In Assurance Case Decompositionmentioning
confidence: 99%
“…If we assure the system under one variant of the dispatcher but later compose our system using a different variant of the dispatcher, the original assurances may not hold. This problem can occur in all three types of composition (1)(2)(3). This dynamic view of composition leads to a new level of complexity and may require a new argumentation structure; one that was not considered during decomposition.…”
Section: Composition Of Assurancesmentioning
confidence: 99%