{"title":"On the timing of applying resource separation during DDoS attacks","authors":"Anmol Kumar, G. Somani","doi":"10.1109/CCGridW59191.2023.00036","DOIUrl":null,"url":null,"abstract":"From the past few years, DDoS attack incidents are continuously rising across the world. Most of these DDoS attacks lasted lesser than 10 minutes time. In the state-of-the-art solutions, we see a class of methods which advocate for the separation of resources to minimize the attack driven resource contention. Resource separation requires additional resources to implement the DDoS defense. In this work, we address an important practical aspect related to the timing of separation. For this, we experimentally compare five scenarios in which different types of separation methods are applied at different timings. We observe that the “always ON” strategy is best among all giving minimum response time and no request failures.","PeriodicalId":341115,"journal":{"name":"2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCGridW59191.2023.00036","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
From the past few years, DDoS attack incidents are continuously rising across the world. Most of these DDoS attacks lasted lesser than 10 minutes time. In the state-of-the-art solutions, we see a class of methods which advocate for the separation of resources to minimize the attack driven resource contention. Resource separation requires additional resources to implement the DDoS defense. In this work, we address an important practical aspect related to the timing of separation. For this, we experimentally compare five scenarios in which different types of separation methods are applied at different timings. We observe that the “always ON” strategy is best among all giving minimum response time and no request failures.