Lightweight resource management for DDoS traffic isolation in a cloud environment

Ibnu Mubarok, Kiryong Lee, Sihyung Lee, Heejo Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Distributed denial-of-service (DDoS) attacks are one of the most difficult issues in network security and communications. This paper is a part of research project that applies distributed defense against distributed attacks. The aim of this project is to provide services by distributing load from one main server to an infrastructure of cloud-based replicas. This paper proposes a lightweight resource management for DDoS traffic isolation in cloud environments. Experimental results show that our mechanism is a viable approach for dynamic resource scaling under high traffic with distributed resource location.

Original languageEnglish
Title of host publicationICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference, SEC 2014, Proceedings
EditorsNora Cuppens-Boulahia, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans
PublisherSpringer Science and Business Media, LLC
Pages44-51
Number of pages8
ISBN (Electronic)9783642554148
DOIs
Publication statusPublished - 2014
Event29th IFIP TC 11 International Conference, SEC 2014 - Marrakesh, Morocco
Duration: 2014 Jun 22014 Jun 4

Publication series

NameIFIP Advances in Information and Communication Technology
Volume428
ISSN (Print)1868-4238
ISSN (Electronic)1868-422X

Conference

Conference29th IFIP TC 11 International Conference, SEC 2014
Country/TerritoryMorocco
CityMarrakesh
Period14/6/214/6/4

Bibliographical note

Publisher Copyright:
© IFIP International Federation for Information Processing 2014.

Keywords

  • Cloud computing
  • DDoS attack
  • Resource management

ASJC Scopus subject areas

  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Lightweight resource management for DDoS traffic isolation in a cloud environment'. Together they form a unique fingerprint.

Cite this