DeMONS: A DDoS Mitigation NFV Solution

被引:6
|
作者
Garcia, Vinicius F. [1 ]
Gaiardo, Guilherme de F. [1 ]
Marcuzzo, Leonardo da C. [1 ]
Nunes, Raul C. [1 ]
dos Santos, Carlos Raniery P. [1 ]
机构
[1] Univ Fed Santa Maria, Postgrad Comp Sci, Santa Maria, RS, Brazil
关键词
ATTACKS;
D O I
10.1109/AINA.2018.00115
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) attacks become increasingly sophisticated and massive in traffic volume. These attacks can be mainly classified as IP Spoofing or Real Source IP. In special, Real Source IP attacks are characterized by the use of malware-infected hosts to simulate real network traffic. Those attacks are constantly evolving, new and sophisticated infection methods are always being employed by attackers. To deal with such constant change, the research community is always searching for advanced approaches to mitigate, or even eliminate, those threats. One of these new approaches, is the use of Network Function Virtualization (NFV). This new paradigm supports the creation of more scalable and flexible, thus resilient, network infrastructures. We, therefore, propose a DDoS mitigation system - called DeMONS - that uses NFV concept together both a dynamic allocation and a reputation mechanisms. The results demonstrate that the employed techniques are a feasible solution to reach higher utilization rates.
引用
收藏
页码:769 / 776
页数:8
相关论文
共 50 条
  • [41] Efficient Orchestration Mechanisms for Congestion Mitigation in NFV: Models and Algorithms
    Elias, Jocelyne
    Martignon, Fabio
    Paris, Stefano
    Wang, Jianping
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (04) : 534 - 546
  • [42] Ensemble-based DDoS Detection and Mitigation Model
    Bhatia, Sajal
    Schmidt, Desmond
    Mohay, George
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 79 - 86
  • [43] Survey on Recent DDoS Mitigation Techniques and Comparative Analysis
    Rai, Ankur
    Challa, Rama Krishna
    2016 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2016, : 96 - 101
  • [44] UDM: NFV-based prevention mechanism against DDoS attack on SDN controller
    Qian H.
    Xue H.
    Chen M.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (03): : 116 - 124
  • [45] An Adaptive SYN Flooding attack Mitigation in DDOS Environment
    Hussain, Khalid
    Hussain, Syed Jawad
    Dillshad, Veena
    Nafees, Muhammad
    Azeem, Muhammad Awais
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (07): : 27 - 33
  • [46] Advance DDOS detection and mitigation technique for securing cloud
    Zareapoor, Masoumeh
    Shamsolmoali, Pourya
    Alam, M. Afshar
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2018, 16 (03) : 303 - 310
  • [47] ML-DDoS: A Blockchain-Based Multilevel DDoS Mitigation Mechanism for IoT Environments
    Hayat, Rana Faisal
    Aurangzeb, Sana
    Aleem, Muhammad
    Srivastava, Gautam
    Lin, Jerry Chun-Wei
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2024, 71 (71) : 12605 - 12618
  • [48] Conditional Disclosure of Encrypted Whitelists for DDoS Attack Mitigation
    Bianchi, Giuseppe
    Rajabi, Hanieh
    Caponi, Alberto
    Picierro, Giulio
    2013 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2013, : 200 - 206
  • [49] IHONEYCOL:A DISTRIBUTED COLLABORATIVE APPROACH FOR MITIGATION OF DDoS ATTACK
    Buvaneswari, M.
    Subha, T.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 340 - 345
  • [50] ArOMA: An SDN based, autonomic DDoS mitigation framework
    Sahay, Rishikesh
    Blanc, Gregory
    Zhang, Zonghua
    Debar, Herue
    COMPUTERS & SECURITY, 2017, 70 : 482 - 499