Javascript must be enabled to continue!
A STUDY PROPOSING IMPROVEMENTS TO OVERLAY NETWORK ARCHITECTURE TO MITIGATE THE IMPACT OF DISTRIBUTED DENIAL-OF-SERVICE ATTACKS ON WEBSITE SYSTEMS
View through CrossRef
Denial-of-service (DoS) attacks on website systems have
become increasingly sophisticated. These attacks are evolving
at a pace and complexity that outstrips the capabilities of
current defensive measures. This paper presents an effective
method to enhance the resilience against distributed denial-of-
service (DDoS) attacks by implementing an overlay network
architecture to protect website systems. This architecture
employs a group of Secure Overlay Access Points (SOAP) to
authenticate and distinguish legitimate users from malicious
attackers, ensuring that valid requests are routed to hidden
nodes within the overlay network via Secure Sockets Layer
(SSL) connections. These hidden nodes then forward user
requests through a filtering region before delivering them to
the target server. The study has introduced enhancements to
the existing overlay network architecture to promptly detect
scenarios where a network node becomes a source of attack
and automatically reroute queries to prevent potential damage.
After conducting experimental simulations of attack scenarios,
the improved architecture has been tested and yielded
auspicious and reliable results compared to the original
architecture. This approach contributes to mitigating and
reducing the impact of DDoS attacks on modern websites.
Keywords: Cyber attacks; denial of service attacks;
distributed denial of service attacks; website; overlay network
Title: A STUDY PROPOSING IMPROVEMENTS TO OVERLAY NETWORK ARCHITECTURE TO MITIGATE THE IMPACT OF DISTRIBUTED DENIAL-OF-SERVICE ATTACKS ON WEBSITE SYSTEMS
Description:
Denial-of-service (DoS) attacks on website systems have
become increasingly sophisticated.
These attacks are evolving
at a pace and complexity that outstrips the capabilities of
current defensive measures.
This paper presents an effective
method to enhance the resilience against distributed denial-of-
service (DDoS) attacks by implementing an overlay network
architecture to protect website systems.
This architecture
employs a group of Secure Overlay Access Points (SOAP) to
authenticate and distinguish legitimate users from malicious
attackers, ensuring that valid requests are routed to hidden
nodes within the overlay network via Secure Sockets Layer
(SSL) connections.
These hidden nodes then forward user
requests through a filtering region before delivering them to
the target server.
The study has introduced enhancements to
the existing overlay network architecture to promptly detect
scenarios where a network node becomes a source of attack
and automatically reroute queries to prevent potential damage.
After conducting experimental simulations of attack scenarios,
the improved architecture has been tested and yielded
auspicious and reliable results compared to the original
architecture.
This approach contributes to mitigating and
reducing the impact of DDoS attacks on modern websites.
Keywords: Cyber attacks; denial of service attacks;
distributed denial of service attacks; website; overlay network.
Related Results
[RETRACTED] Keanu Reeves CBD Gummies v1
[RETRACTED] Keanu Reeves CBD Gummies v1
[RETRACTED]Keanu Reeves CBD Gummies ==❱❱ Huge Discounts:[HURRY UP ] Absolute Keanu Reeves CBD Gummies (Available)Order Online Only!! ❰❰= https://www.facebook.com/Keanu-Reeves-CBD-G...
Forecast of post-overlay flexible pavement roughness progression: a random coefficient linear regression with autocorrelation model
Forecast of post-overlay flexible pavement roughness progression: a random coefficient linear regression with autocorrelation model
Abstract
A pavement roughness progression model is an essential component in a pavement management system. Asphalt overlay is a typical pavement maintenance and reha...
Housing Improvements for Health and Associated Socio‐Economic Outcomes: A Systematic Review
Housing Improvements for Health and Associated Socio‐Economic Outcomes: A Systematic Review
Poor housing is associated with poor health. This suggests that improving housing conditions might lead to improved health for residents. This review searched widely for studies fr...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
The architecture of differences
The architecture of differences
Following in the footsteps of the protagonists of the Italian architectural debate is a mark of culture and proactivity. The synthesis deriving from the artistic-humanistic factors...
Website sebagai Media Informasi Publik
Website sebagai Media Informasi Publik
Abstract. Technological developments make it easy to communicate through digital communication. This digital communication process is supported by the presence of means or containe...
Pembuatan Aplikasi Web Desa Wisata Cipayung Depok
Pembuatan Aplikasi Web Desa Wisata Cipayung Depok
The rapid development of digital technology has affected many sectors, including the tourism sector. Utilizing digital platforms, such as websites, is an option for promoting touri...
Application of Computer Data Mining Technology Based on AKN Algorithm in Denial of Service Attack Defense Detection
Application of Computer Data Mining Technology Based on AKN Algorithm in Denial of Service Attack Defense Detection
Denial of service attacks have become one of the most difficult network security problems because they are easy to implement, difficult to prevent, and difficult to track, and they...

