DeMONS: A DDoS Mitigation NFV Solution

被引:6
|
作者
Garcia, Vinicius F. [1 ]
Gaiardo, Guilherme de F. [1 ]
Marcuzzo, Leonardo da C. [1 ]
Nunes, Raul C. [1 ]
dos Santos, Carlos Raniery P. [1 ]
机构
[1] Univ Fed Santa Maria, Postgrad Comp Sci, Santa Maria, RS, Brazil
关键词
ATTACKS;
D O I
10.1109/AINA.2018.00115
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) attacks become increasingly sophisticated and massive in traffic volume. These attacks can be mainly classified as IP Spoofing or Real Source IP. In special, Real Source IP attacks are characterized by the use of malware-infected hosts to simulate real network traffic. Those attacks are constantly evolving, new and sophisticated infection methods are always being employed by attackers. To deal with such constant change, the research community is always searching for advanced approaches to mitigate, or even eliminate, those threats. One of these new approaches, is the use of Network Function Virtualization (NFV). This new paradigm supports the creation of more scalable and flexible, thus resilient, network infrastructures. We, therefore, propose a DDoS mitigation system - called DeMONS - that uses NFV concept together both a dynamic allocation and a reputation mechanisms. The results demonstrate that the employed techniques are a feasible solution to reach higher utilization rates.
引用
收藏
页码:769 / 776
页数:8
相关论文
共 50 条
  • [31] DoS and DDoS mitigation using Variational Autoencoders
    Bårli, Eirik Molde
    Yazidi, Anis
    Viedma, Enrique Herrera
    Haugerud, Hårek
    Computer Networks, 2021, 199
  • [32] SCALABLE DDOS MITIGATION SYSTEM FOR DATA CENTERS
    Martinasek, Zdenek
    ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2015, 13 (04) : 332 - 337
  • [33] Dynamic Threshold for DDoS Mitigation in SDN Environment
    Hong, Guo-Chih
    Lee, Chung-Nan
    Lee, Ming-Feng
    2019 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2019, : 1 - 7
  • [34] A Rule Based DDoS Detection and Mitigation Technique
    Khamruddin, A. Md.
    Rupa, B. Dr Ch.
    3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
  • [35] Empowering DDoS Attack Mitigation with Programmable Switches
    Chen, Xiang
    Liu, Hongyan
    Zhang, Dong
    Huang, Qun
    Zhou, Haifeng
    Wu, Chunming
    Yang, Qiang
    IEEE NETWORK, 2023, 37 (03): : 112 - 117
  • [36] 基于NFV的新的协作式DDoS防御技术
    许传丰
    林晖
    郭烜成
    汪晓丁
    网络与信息安全学报, 2019, 5 (02) : 66 - 76
  • [37] Using NFV and Reinforcement Learning for Anomalies Detection and Mitigation in SDN
    Sampaio, Lauren S. R.
    Faustini, Pedro H. A.
    Silva, Anderson S.
    Granville, Lisandro Z.
    Schaeffer-Filho, Alberto
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 437 - 442
  • [38] SDN Based Collaborative Scheme for Mitigation of DDoS Attacks
    Hameed, Sufian
    Khan, Hassan Ahmed
    FUTURE INTERNET, 2018, 10 (03)
  • [39] Future of DDoS Attacks Mitigation in Software Defined Networks
    Vizvary, Martin
    Vykopal, Jan
    MONITORING AND SECURING VIRTUALIZED NETWORKS AND SERVICES, 2014, 8508 : 123 - 127
  • [40] Mitigation of DDoS Attacks through Pushback and Resource Regulation
    Wang, Xiuli
    2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 225 - 228