A comparative analysis of various deployment based DDoS defense schemes

2Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Distributed denial of service attack is a major threat to the availability of internet services and resources. The current internet infrastructure is vulnerable to DDoS attacks and has no built in mechanism to defend against them. The main task of the defense system is to accurately detect and respond against DDoS attacks. A variety of DDoS defense solutions are available but having difficulties to choose among them. There are different places in the internet, where a defense system can be deployed. The various points in the internet where defense systems can be deployed are identified and discussed here. A comparative analysis of different defense schemes corresponding to deployment points are also carried out. The main aim of this review paper is to provide an individual or academia to insight into various possible deployments locations suitable for DDoS defense system. It helps them to choose an appropriate defense method and suitable deployment location.

Cite

CITATION STYLE

APA

Singh, K., Kaur, N., & Nehra, D. (2013). A comparative analysis of various deployment based DDoS defense schemes. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 115, pp. 606–616). Springer Verlag. https://doi.org/10.1007/978-3-642-37949-9_53

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free