Javascript must be enabled to continue!
A STUDY PROPOSING IMPROVEMENTS TO OVERLAY NETWORK ARCHITECTURE TO MITIGATE THE IMPACT OF DISTRIBUTED DENIAL-OF-SERVICE ATTACKS ON WEBSITE SYSTEMS
View through CrossRef
Denial-of-service (DoS) attacks on website systems have
become increasingly sophisticated. These attacks are evolving
at a pace and complexity that outstrips the capabilities of
current defensive measures. This paper presents an effective
method to enhance the resilience against distributed denial-of-
service (DDoS) attacks by implementing an overlay network
architecture to protect website systems. This architecture
employs a group of Secure Overlay Access Points (SOAP) to
authenticate and distinguish legitimate users from malicious
attackers, ensuring that valid requests are routed to hidden
nodes within the overlay network via Secure Sockets Layer
(SSL) connections. These hidden nodes then forward user
requests through a filtering region before delivering them to
the target server. The study has introduced enhancements to
the existing overlay network architecture to promptly detect
scenarios where a network node becomes a source of attack
and automatically reroute queries to prevent potential damage.
After conducting experimental simulations of attack scenarios,
the improved architecture has been tested and yielded
auspicious and reliable results compared to the original
architecture. This approach contributes to mitigating and
reducing the impact of DDoS attacks on modern websites.
Keywords: Cyber attacks; denial of service attacks;
distributed denial of service attacks; website; overlay network
Title: A STUDY PROPOSING IMPROVEMENTS TO OVERLAY NETWORK ARCHITECTURE TO MITIGATE THE IMPACT OF DISTRIBUTED DENIAL-OF-SERVICE ATTACKS ON WEBSITE SYSTEMS
Description:
Denial-of-service (DoS) attacks on website systems have
become increasingly sophisticated.
These attacks are evolving
at a pace and complexity that outstrips the capabilities of
current defensive measures.
This paper presents an effective
method to enhance the resilience against distributed denial-of-
service (DDoS) attacks by implementing an overlay network
architecture to protect website systems.
This architecture
employs a group of Secure Overlay Access Points (SOAP) to
authenticate and distinguish legitimate users from malicious
attackers, ensuring that valid requests are routed to hidden
nodes within the overlay network via Secure Sockets Layer
(SSL) connections.
These hidden nodes then forward user
requests through a filtering region before delivering them to
the target server.
The study has introduced enhancements to
the existing overlay network architecture to promptly detect
scenarios where a network node becomes a source of attack
and automatically reroute queries to prevent potential damage.
After conducting experimental simulations of attack scenarios,
the improved architecture has been tested and yielded
auspicious and reliable results compared to the original
architecture.
This approach contributes to mitigating and
reducing the impact of DDoS attacks on modern websites.
Keywords: Cyber attacks; denial of service attacks;
distributed denial of service attacks; website; overlay network.
Related Results
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
Website sebagai Media Informasi Publik
Website sebagai Media Informasi Publik
Abstract. Technological developments make it easy to communicate through digital communication. This digital communication process is supported by the presence of means or containe...
Evaluasi Kinerja Website Pelayanan Publik Pemerintah Daerah Pada Provinsi Kalimantan Timur
Evaluasi Kinerja Website Pelayanan Publik Pemerintah Daerah Pada Provinsi Kalimantan Timur
This research aims to evaluate the performance of websites managed by the regional government of East Kalimantan province and also to provide input on improving the performance of ...
Timely Detection of DDoS Attacks with Dimenstionality Reduction
Timely Detection of DDoS Attacks with Dimenstionality Reduction
Due to the interconnectedness and exponential proliferation of IoT devices, the technology is more susceptible to network attacks like Distributed Denial of Service (DDoS), which d...
Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Recommender systems have become an integral part of online services due to their ability to help users locate specific information in a sea of data. However, existing studies show ...
Mitigating DDoS Attacks in Cloud Networks
Mitigating DDoS Attacks in Cloud Networks
Distributed Denial of Service (DDoS) attacks represent a significant and growing threat to cloud networks, capable of causing extensive service disruptions and substantial financia...
Development and Evaluation of a Clinician-Vetted Dementia Caregiver Resources Website: Mixed Methods Approach (Preprint)
Development and Evaluation of a Clinician-Vetted Dementia Caregiver Resources Website: Mixed Methods Approach (Preprint)
BACKGROUND
About 11 million Americans are caregivers for the 6.7 million Americans currently living with dementia. They provide over 18 billion hours of unp...
Evaluasi Penggunaan Website Puskesmas
Evaluasi Penggunaan Website Puskesmas
Latar belakang : Teknologi website sangat mempengaruhi pelayanan puskesmas. Pengadaan website dalam rangka memenuhi tuntutan pengguna akan ketersediaan layanan yang mudah, cepat da...

