Detecting and Mitigating Network attacks using Network Simulator 3
Author(s):
Anmol Bamane, Advait Porandwar, Allan Jadhav
Keywords:
Abstract
Distributed Denial of Service (DDoS) attacks pose significant threats to the availability and stability of online services. This abstract explores the technique of employing a proxy server as a means to mitigate the impact of DDoS attacks. By introducing a buffer node between clients and servers, the proxy server acts as an intermediary, filtering and inspecting incoming traffic to identify and discard malicious requests while allowing legitimate traffic to reach the server. Additionally, the proxy server can enforce rate limiting measures to control traffic flow, preventing overwhelming volumes of requests from reaching the server. Although this approach can enhance DDoS protection, it is important to consider potential latency implications and the possibility of determined attackers bypassing the proxy server. Thus, a comprehensive DDoS mitigation strategy involves multiple layers of defense, including network-based and application-based defenses. By leveraging the proxy server technique alongside other measures, organizations can bolster their network defenses, fortify their resilience against DDoS attacks, and ensure uninterrupted availability of their services.
Key words: DDoS attacks, proxy server, mitigating, network defenses, buffer node, intermediary, filtering, inspecting, malicious requests, legitimate traffic, rate limiting, latency implications, determined attackers, comprehensive mitigation strategy, network-based defenses, application-based defenses, bolster, resilience, uninterrupted availability, services.
Article Details
Unique Paper ID: 160187
Publication Volume & Issue: Volume 9, Issue 12
Page(s): 1285 - 1292
Article Preview & Download
Share This Article
Conference Alert
NCSST-2021
AICTE Sponsored National Conference on Smart Systems and Technologies
Last Date: 25th November 2021
SWEC- Management
LATEST INNOVATION’S AND FUTURE TRENDS IN MANAGEMENT