通过资源共享网络减少DDoS攻击

Farabi Fardin Khan, Nafis Mohaimin Hossain, Md. Nazrul Huda Shanto, Sad Bin Anwar, Jannatun Noor
{"title":"通过资源共享网络减少DDoS攻击","authors":"Farabi Fardin Khan, Nafis Mohaimin Hossain, Md. Nazrul Huda Shanto, Sad Bin Anwar, Jannatun Noor","doi":"10.1145/3569551.3569560","DOIUrl":null,"url":null,"abstract":"Cloud computing has gained noticeable popularity due to its ability to radically improve computing power through the application of virtual machines. In this era of the internet, however, security threats are increasing and it is costing many businesses. The seemingly legitimate traffic of these application-level attacks renders the previous detection and mitigation methods ineffective. These cyber-attacks have grown ever so sophisticated and the detection and mitigation of these attacks has become one of the major concerns of security researchers and cloud service providers all around the globe. In this paper, we propose a resource sharing method to create a universal solution to mitigate DDoS attacks. We use an existing filtering method to track the IP addresses of attackers, then send them to the proxy server and delete unwanted IP packet requests by memory management system. Later, we emulate the blockchain network using 50 Nginx VM servers as a start to show the potential of our proposal. We show that our method can mitigate 66% of attacks with only 50VMs. To maximize the capability of mitigating DDoS attacks of our network, we need to increase the number of VM’s and it may take at least a few dozen developers working years on end to develop. Therefore, the goal of this paper is to lay the foundation on which one day the universal solution will be created.","PeriodicalId":177068,"journal":{"name":"Proceedings of the 9th International Conference on Networking, Systems and Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Mitigating DDoS Attacks Using a Resource Sharing Network\",\"authors\":\"Farabi Fardin Khan, Nafis Mohaimin Hossain, Md. Nazrul Huda Shanto, Sad Bin Anwar, Jannatun Noor\",\"doi\":\"10.1145/3569551.3569560\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing has gained noticeable popularity due to its ability to radically improve computing power through the application of virtual machines. In this era of the internet, however, security threats are increasing and it is costing many businesses. The seemingly legitimate traffic of these application-level attacks renders the previous detection and mitigation methods ineffective. These cyber-attacks have grown ever so sophisticated and the detection and mitigation of these attacks has become one of the major concerns of security researchers and cloud service providers all around the globe. In this paper, we propose a resource sharing method to create a universal solution to mitigate DDoS attacks. We use an existing filtering method to track the IP addresses of attackers, then send them to the proxy server and delete unwanted IP packet requests by memory management system. Later, we emulate the blockchain network using 50 Nginx VM servers as a start to show the potential of our proposal. We show that our method can mitigate 66% of attacks with only 50VMs. To maximize the capability of mitigating DDoS attacks of our network, we need to increase the number of VM’s and it may take at least a few dozen developers working years on end to develop. Therefore, the goal of this paper is to lay the foundation on which one day the universal solution will be created.\",\"PeriodicalId\":177068,\"journal\":{\"name\":\"Proceedings of the 9th International Conference on Networking, Systems and Security\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 9th International Conference on Networking, Systems and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3569551.3569560\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 9th International Conference on Networking, Systems and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3569551.3569560","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

由于云计算能够通过虚拟机的应用程序从根本上提高计算能力,因此它已经获得了显著的普及。然而,在这个互联网时代,安全威胁正在增加,这让许多企业付出了代价。这些应用层攻击看似合法的流量使得之前的检测和缓解方法失效。这些网络攻击变得越来越复杂,检测和缓解这些攻击已成为全球安全研究人员和云服务提供商的主要关注点之一。在本文中,我们提出了一种资源共享的方法来创建一个通用的解决方案,以减轻DDoS攻击。我们利用现有的过滤方法跟踪攻击者的IP地址,然后将其发送到代理服务器,并通过内存管理系统删除不需要的IP包请求。随后,我们使用50个Nginx虚拟机服务器模拟区块链网络,以此作为开始,展示我们提议的潜力。我们表明,我们的方法可以仅用50vm减轻66%的攻击。为了最大限度地减轻网络DDoS攻击的能力,我们需要增加虚拟机的数量,这可能需要至少几十个开发人员连续工作数年才能完成。因此,本文的目标是为有朝一日创建通用解决方案奠定基础。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Mitigating DDoS Attacks Using a Resource Sharing Network
Cloud computing has gained noticeable popularity due to its ability to radically improve computing power through the application of virtual machines. In this era of the internet, however, security threats are increasing and it is costing many businesses. The seemingly legitimate traffic of these application-level attacks renders the previous detection and mitigation methods ineffective. These cyber-attacks have grown ever so sophisticated and the detection and mitigation of these attacks has become one of the major concerns of security researchers and cloud service providers all around the globe. In this paper, we propose a resource sharing method to create a universal solution to mitigate DDoS attacks. We use an existing filtering method to track the IP addresses of attackers, then send them to the proxy server and delete unwanted IP packet requests by memory management system. Later, we emulate the blockchain network using 50 Nginx VM servers as a start to show the potential of our proposal. We show that our method can mitigate 66% of attacks with only 50VMs. To maximize the capability of mitigating DDoS attacks of our network, we need to increase the number of VM’s and it may take at least a few dozen developers working years on end to develop. Therefore, the goal of this paper is to lay the foundation on which one day the universal solution will be created.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信