Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A STUDY PROPOSING IMPROVEMENTS TO OVERLAY NETWORK ARCHITECTURE TO MITIGATE THE IMPACT OF DISTRIBUTED DENIAL-OF-SERVICE ATTACKS ON WEBSITE SYSTEMS

View through CrossRef
Denial-of-service (DoS) attacks on website systems have become increasingly sophisticated. These attacks are evolving at a pace and complexity that outstrips the capabilities of current defensive measures. This paper presents an effective method to enhance the resilience against distributed denial-of- service (DDoS) attacks by implementing an overlay network architecture to protect website systems. This architecture employs a group of Secure Overlay Access Points (SOAP) to authenticate and distinguish legitimate users from malicious attackers, ensuring that valid requests are routed to hidden nodes within the overlay network via Secure Sockets Layer (SSL) connections. These hidden nodes then forward user requests through a filtering region before delivering them to the target server. The study has introduced enhancements to the existing overlay network architecture to promptly detect scenarios where a network node becomes a source of attack and automatically reroute queries to prevent potential damage. After conducting experimental simulations of attack scenarios, the improved architecture has been tested and yielded auspicious and reliable results compared to the original architecture. This approach contributes to mitigating and reducing the impact of DDoS attacks on modern websites. Keywords: Cyber attacks; denial of service attacks; distributed denial of service attacks; website; overlay network
Title: A STUDY PROPOSING IMPROVEMENTS TO OVERLAY NETWORK ARCHITECTURE TO MITIGATE THE IMPACT OF DISTRIBUTED DENIAL-OF-SERVICE ATTACKS ON WEBSITE SYSTEMS
Description:
Denial-of-service (DoS) attacks on website systems have become increasingly sophisticated.
These attacks are evolving at a pace and complexity that outstrips the capabilities of current defensive measures.
This paper presents an effective method to enhance the resilience against distributed denial-of- service (DDoS) attacks by implementing an overlay network architecture to protect website systems.
This architecture employs a group of Secure Overlay Access Points (SOAP) to authenticate and distinguish legitimate users from malicious attackers, ensuring that valid requests are routed to hidden nodes within the overlay network via Secure Sockets Layer (SSL) connections.
These hidden nodes then forward user requests through a filtering region before delivering them to the target server.
The study has introduced enhancements to the existing overlay network architecture to promptly detect scenarios where a network node becomes a source of attack and automatically reroute queries to prevent potential damage.
After conducting experimental simulations of attack scenarios, the improved architecture has been tested and yielded auspicious and reliable results compared to the original architecture.
This approach contributes to mitigating and reducing the impact of DDoS attacks on modern websites.
Keywords: Cyber attacks; denial of service attacks; distributed denial of service attacks; website; overlay network.

Related Results

Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
Website sebagai Media Informasi Publik
Website sebagai Media Informasi Publik
Abstract. Technological developments make it easy to communicate through digital communication. This digital communication process is supported by the presence of means or containe...
Evaluasi Kinerja Website Pelayanan Publik Pemerintah Daerah Pada Provinsi Kalimantan Timur
Evaluasi Kinerja Website Pelayanan Publik Pemerintah Daerah Pada Provinsi Kalimantan Timur
This research aims to evaluate the performance of websites managed by the regional government of East Kalimantan province and also to provide input on improving the performance of ...
Timely Detection of DDoS Attacks with Dimenstionality Reduction
Timely Detection of DDoS Attacks with Dimenstionality Reduction
Due to the interconnectedness and exponential proliferation of IoT devices, the technology is more susceptible to network attacks like Distributed Denial of Service (DDoS), which d...
Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Recommender systems have become an integral part of online services due to their ability to help users locate specific information in a sea of data. However, existing studies show ...
Mitigating DDoS Attacks in Cloud Networks
Mitigating DDoS Attacks in Cloud Networks
Distributed Denial of Service (DDoS) attacks represent a significant and growing threat to cloud networks, capable of causing extensive service disruptions and substantial financia...
Development and Evaluation of a Clinician-Vetted Dementia Caregiver Resources Website: Mixed Methods Approach (Preprint)
Development and Evaluation of a Clinician-Vetted Dementia Caregiver Resources Website: Mixed Methods Approach (Preprint)
BACKGROUND About 11 million Americans are caregivers for the 6.7 million Americans currently living with dementia. They provide over 18 billion hours of unp...
Evaluasi Penggunaan Website Puskesmas
Evaluasi Penggunaan Website Puskesmas
Latar belakang : Teknologi website sangat mempengaruhi pelayanan puskesmas. Pengadaan website dalam rangka memenuhi tuntutan pengguna akan ketersediaan layanan yang mudah, cepat da...

Back to Top