Detecting and Mitigating Network attacks using Network Simulator 3

  • Unique Paper ID: 160187
  • Volume: 9
  • Issue: 12
  • PageNo: 1285-1292
  • Abstract:
  • Distributed Denial of Service (DDoS) attacks pose significant threats to the availability and stability of online services. This abstract explores the technique of employing a proxy server as a means to mitigate the impact of DDoS attacks. By introducing a buffer node between clients and servers, the proxy server acts as an intermediary, filtering and inspecting incoming traffic to identify and discard malicious requests while allowing legitimate traffic to reach the server. Additionally, the proxy server can enforce rate limiting measures to control traffic flow, preventing overwhelming volumes of requests from reaching the server. Although this approach can enhance DDoS protection, it is important to consider potential latency implications and the possibility of determined attackers bypassing the proxy server. Thus, a comprehensive DDoS mitigation strategy involves multiple layers of defense, including network-based and application-based defenses. By leveraging the proxy server technique alongside other measures, organizations can bolster their network defenses, fortify their resilience against DDoS attacks, and ensure uninterrupted availability of their services. Key words: DDoS attacks, proxy server, mitigating, network defenses, buffer node, intermediary, filtering, inspecting, malicious requests, legitimate traffic, rate limiting, latency implications, determined attackers, comprehensive mitigation strategy, network-based defenses, application-based defenses, bolster, resilience, uninterrupted availability, services.

Cite This Article

  • ISSN: 2349-6002
  • Volume: 9
  • Issue: 12
  • PageNo: 1285-1292

Detecting and Mitigating Network attacks using Network Simulator 3

Related Articles