A Cost Optimized Solution for Defending Against DDoS Attacks: An Analysis of a Multi-layered Architecture

被引:0
|
作者
Gaylah K.D. [1 ]
Vaghela R.S. [1 ]
Zongo W.-B.S. [1 ]
机构
[1] Marwadi University, Gujarat
关键词
DDoS protection; Intrusion detection; Load balancing; Multi-layered defense; Network security; Web server cluster;
D O I
10.1007/s42979-023-02001-x
中图分类号
学科分类号
摘要
Distributed denial-of-service (DDoS) attacks have grown to be a major concern for businesses and individuals who use the internet for operations and communications. DDoS attacks have the potential to seriously harm a website or online service, resulting in losses in money and reputational damage. In this research, we propose a cost-optimized and multi-layered DDoS protection architecture that utilizes a firewall, IDS/IPS, reverse proxy, and web server cluster. The architecture offers protection from a variety of DDoS attacks, including volumetric, network-layer, application-layer, and SSL attacks. We test the architecture in real-world scenarios and analyzed the results to determine how effective it is. We demonstrate that our architecture is capable of successfully mitigating DDoS attacks while maintaining the availability of the website to legitimate users through extensive testing and analysis of test results. Our research shows that the suggested architecture for DDoS protection is affordable and simple to integrate into existing systems. © 2023, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
  • [1] A novel architecture for detecting and defending against flooding-based DDoS attacks
    Shi, Y
    Yang, XY
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 364 - 374
  • [2] An Adaptive Approach for Defending against DDoS Attacks
    Li, Muhai
    Li, Ming
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2010, 2010
  • [3] Practical Techniques for Defending against DDoS Attacks
    Chen, Eric Y.
    Yonezawa, Akinori
    [J]. 3RD ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, 2005, 2005,
  • [4] Multi-Layered Defense against Web Application Attacks
    Razzaq, Abdul
    Hur, Ali
    Haider, Nasir
    Ahmad, Farooq
    [J]. PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 492 - 497
  • [5] Defending against spoofed DDoS attacks with path fingerprint
    Lee, FY
    Shieh, S
    [J]. COMPUTERS & SECURITY, 2005, 24 (07) : 571 - 586
  • [6] Defending Wireless Infrastructure Against the Challenge of DDoS Attacks
    Xianjun Geng
    Yun Huang
    Andrew B. Whinston
    [J]. Mobile Networks and Applications, 2002, 7 : 213 - 223
  • [7] Two Layer Defending Mechanism against DDoS Attacks
    Subramanian, Kiruthika
    Gunasekaran, Preetha
    Selvaraj, Mercy
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2015, 12 (04) : 317 - 324
  • [8] Defending wireless infrastructure against the challenge of DDoS attacks
    Geng, XJ
    Huang, Y
    Whinston, AB
    [J]. MOBILE NETWORKS & APPLICATIONS, 2002, 7 (03): : 213 - 223
  • [9] A Multi-Layered Defence Strategy against DDoS Attacks in SDN/NFV-Based 5G Mobile Networks
    Sheibani, Morteza
    Konur, Savas
    Awan, Irfan
    Qureshi, Amna
    [J]. ELECTRONICS, 2024, 13 (08)
  • [10] Multi attribute auction based incentivized solution against DDoS attacks
    Dahiya, Amrita
    Gupta, B. B.
    [J]. COMPUTERS & SECURITY, 2020, 92