Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A STUDY PROPOSING IMPROVEMENTS TO OVERLAY NETWORK ARCHITECTURE TO MITIGATE THE IMPACT OF DISTRIBUTED DENIAL-OF-SERVICE ATTACKS ON WEBSITE SYSTEMS

View through CrossRef
Denial-of-service (DoS) attacks on website systems have become increasingly sophisticated. These attacks are evolving at a pace and complexity that outstrips the capabilities of current defensive measures. This paper presents an effective method to enhance the resilience against distributed denial-of- service (DDoS) attacks by implementing an overlay network architecture to protect website systems. This architecture employs a group of Secure Overlay Access Points (SOAP) to authenticate and distinguish legitimate users from malicious attackers, ensuring that valid requests are routed to hidden nodes within the overlay network via Secure Sockets Layer (SSL) connections. These hidden nodes then forward user requests through a filtering region before delivering them to the target server. The study has introduced enhancements to the existing overlay network architecture to promptly detect scenarios where a network node becomes a source of attack and automatically reroute queries to prevent potential damage. After conducting experimental simulations of attack scenarios, the improved architecture has been tested and yielded auspicious and reliable results compared to the original architecture. This approach contributes to mitigating and reducing the impact of DDoS attacks on modern websites. Keywords: Cyber attacks; denial of service attacks; distributed denial of service attacks; website; overlay network
Title: A STUDY PROPOSING IMPROVEMENTS TO OVERLAY NETWORK ARCHITECTURE TO MITIGATE THE IMPACT OF DISTRIBUTED DENIAL-OF-SERVICE ATTACKS ON WEBSITE SYSTEMS
Description:
Denial-of-service (DoS) attacks on website systems have become increasingly sophisticated.
These attacks are evolving at a pace and complexity that outstrips the capabilities of current defensive measures.
This paper presents an effective method to enhance the resilience against distributed denial-of- service (DDoS) attacks by implementing an overlay network architecture to protect website systems.
This architecture employs a group of Secure Overlay Access Points (SOAP) to authenticate and distinguish legitimate users from malicious attackers, ensuring that valid requests are routed to hidden nodes within the overlay network via Secure Sockets Layer (SSL) connections.
These hidden nodes then forward user requests through a filtering region before delivering them to the target server.
The study has introduced enhancements to the existing overlay network architecture to promptly detect scenarios where a network node becomes a source of attack and automatically reroute queries to prevent potential damage.
After conducting experimental simulations of attack scenarios, the improved architecture has been tested and yielded auspicious and reliable results compared to the original architecture.
This approach contributes to mitigating and reducing the impact of DDoS attacks on modern websites.
Keywords: Cyber attacks; denial of service attacks; distributed denial of service attacks; website; overlay network.

Related Results

[RETRACTED] Keanu Reeves CBD Gummies v1
[RETRACTED] Keanu Reeves CBD Gummies v1
[RETRACTED]Keanu Reeves CBD Gummies ==❱❱ Huge Discounts:[HURRY UP ] Absolute Keanu Reeves CBD Gummies (Available)Order Online Only!! ❰❰= https://www.facebook.com/Keanu-Reeves-CBD-G...
Housing Improvements for Health and Associated Socio‐Economic Outcomes: A Systematic Review
Housing Improvements for Health and Associated Socio‐Economic Outcomes: A Systematic Review
Poor housing is associated with poor health. This suggests that improving housing conditions might lead to improved health for residents. This review searched widely for studies fr...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
The architecture of differences
The architecture of differences
Following in the footsteps of the protagonists of the Italian architectural debate is a mark of culture and proactivity. The synthesis deriving from the artistic-humanistic factors...
Website sebagai Media Informasi Publik
Website sebagai Media Informasi Publik
Abstract. Technological developments make it easy to communicate through digital communication. This digital communication process is supported by the presence of means or containe...
Pembuatan Aplikasi Web Desa Wisata Cipayung Depok
Pembuatan Aplikasi Web Desa Wisata Cipayung Depok
The rapid development of digital technology has affected many sectors, including the tourism sector. Utilizing digital platforms, such as websites, is an option for promoting touri...
Application of Computer Data Mining Technology Based on AKN Algorithm in Denial of Service Attack Defense Detection
Application of Computer Data Mining Technology Based on AKN Algorithm in Denial of Service Attack Defense Detection
Denial of service attacks have become one of the most difficult network security problems because they are easy to implement, difficult to prevent, and difficult to track, and they...

Back to Top