TY - GEN
T1 - A simulation study of the proactive server roaming for mitigating denial of service attacks
AU - Sanetachatanaruk, C.
AU - Khattab, S. M.
AU - Znati, T.
AU - Melhem, R.
AU - Mossé, D.
N1 - Publisher Copyright:
© 2003 IEEE.
PY - 2003
Y1 - 2003
N2 - The main goal of the NETSEC project is to design and implement a framework for mitigating the effects of the node-based and link-based denial of service (DoS) attacks. Our strategy employs three lines of defense. The first line of defense is to restrict the access to the defended services using offline service subscription, encryption and other traditional security techniques. The second line of defense is server roaming, by which we mean the migration of the service from one server to another, where the new server has a different IP address. Finally, each server and firewall(s) implement resource management schemes as a third line of defense. For example, deploying separate input queues to allocate different classes of service requests. We show our simulation study on the second line of defense, the server roaming. The design and procedure of the sever roaming on the NS2 is described. The promising results of applying the server roaming to mitigate the DoS attack in the simulation are also shown with analysis.
AB - The main goal of the NETSEC project is to design and implement a framework for mitigating the effects of the node-based and link-based denial of service (DoS) attacks. Our strategy employs three lines of defense. The first line of defense is to restrict the access to the defended services using offline service subscription, encryption and other traditional security techniques. The second line of defense is server roaming, by which we mean the migration of the service from one server to another, where the new server has a different IP address. Finally, each server and firewall(s) implement resource management schemes as a third line of defense. For example, deploying separate input queues to allocate different classes of service requests. We show our simulation study on the second line of defense, the server roaming. The design and procedure of the sever roaming on the NS2 is described. The promising results of applying the server roaming to mitigate the DoS attack in the simulation are also shown with analysis.
KW - Authentication
KW - Bandwidth
KW - Computational modeling
KW - Computer crime
KW - Cryptography
KW - File servers
KW - Internet
KW - Network servers
KW - Operating systems
KW - Web server
UR - http://www.scopus.com/inward/record.url?scp=3042850692&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=3042850692&partnerID=8YFLogxK
U2 - 10.1109/SIMSYM.2003.1192793
DO - 10.1109/SIMSYM.2003.1192793
M3 - Conference contribution
AN - SCOPUS:3042850692
T3 - Proceedings - Simulation Symposium
SP - 7
EP - 14
BT - Proceedings - 36th Annual Simulation Symposium, ANSS 2003
PB - IEEE Computer Society
T2 - 36th Annual Simulation Symposium, ANSS 2003
Y2 - 30 March 2003 through 2 April 2003
ER -