{"title":"安全覆盖服务(SOS):一个关键的分析","authors":"R. Kaur, A. L. Sangal, K. Kumar","doi":"10.1109/PDGC.2012.6449864","DOIUrl":null,"url":null,"abstract":"Due to increased use of the internet for various time critical applications such as banks, power stations, mission critical applications and even our defense system its unavailability greatly hinders our day to day operations. We all know that the biggest threat to the availability of internet is Distributed Denial of Service (DDoS) attack. The objective of DDoS attack is to consume the target's resources to such an extent that it becomes incapable to serve legitimate clients. Till date, a wide variety of solutions have been proposed to solve this problem but a very few of them concentrate on protecting critical infrastructures. Secure Overlay Services (SOS) architecture acts as a basis to protect all these time critical applications. It proactively prevents the target by providing layers of security between the authenticated client and the protected target. Although SOS architecture is successful in complicating the job of attacker, but still it is vulnerable to various attacks. Various researchers critically study this architecture and discuss various attacks possible on it. The aim of this paper is to review various attacks possible on this architecture so that more detailed understanding of attacker's strategy can be achieved and use this knowledge to develop more robust solutions.","PeriodicalId":166718,"journal":{"name":"2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Secure Overlay Services (SOS): A critical analysis\",\"authors\":\"R. Kaur, A. L. Sangal, K. Kumar\",\"doi\":\"10.1109/PDGC.2012.6449864\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to increased use of the internet for various time critical applications such as banks, power stations, mission critical applications and even our defense system its unavailability greatly hinders our day to day operations. We all know that the biggest threat to the availability of internet is Distributed Denial of Service (DDoS) attack. The objective of DDoS attack is to consume the target's resources to such an extent that it becomes incapable to serve legitimate clients. Till date, a wide variety of solutions have been proposed to solve this problem but a very few of them concentrate on protecting critical infrastructures. Secure Overlay Services (SOS) architecture acts as a basis to protect all these time critical applications. It proactively prevents the target by providing layers of security between the authenticated client and the protected target. Although SOS architecture is successful in complicating the job of attacker, but still it is vulnerable to various attacks. Various researchers critically study this architecture and discuss various attacks possible on it. The aim of this paper is to review various attacks possible on this architecture so that more detailed understanding of attacker's strategy can be achieved and use this knowledge to develop more robust solutions.\",\"PeriodicalId\":166718,\"journal\":{\"name\":\"2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PDGC.2012.6449864\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PDGC.2012.6449864","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure Overlay Services (SOS): A critical analysis
Due to increased use of the internet for various time critical applications such as banks, power stations, mission critical applications and even our defense system its unavailability greatly hinders our day to day operations. We all know that the biggest threat to the availability of internet is Distributed Denial of Service (DDoS) attack. The objective of DDoS attack is to consume the target's resources to such an extent that it becomes incapable to serve legitimate clients. Till date, a wide variety of solutions have been proposed to solve this problem but a very few of them concentrate on protecting critical infrastructures. Secure Overlay Services (SOS) architecture acts as a basis to protect all these time critical applications. It proactively prevents the target by providing layers of security between the authenticated client and the protected target. Although SOS architecture is successful in complicating the job of attacker, but still it is vulnerable to various attacks. Various researchers critically study this architecture and discuss various attacks possible on it. The aim of this paper is to review various attacks possible on this architecture so that more detailed understanding of attacker's strategy can be achieved and use this knowledge to develop more robust solutions.