Lightweight resource management for DDoS traffic isolation in a cloud environment

Ibnu Mubarok, Kiryong Lee, Sihyung Lee, Heejo Lee

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)

    Abstract

    Distributed denial-of-service (DDoS) attacks are one of the most difficult issues in network security and communications. This paper is a part of research project that applies distributed defense against distributed attacks. The aim of this project is to provide services by distributing load from one main server to an infrastructure of cloud-based replicas. This paper proposes a lightweight resource management for DDoS traffic isolation in cloud environments. Experimental results show that our mechanism is a viable approach for dynamic resource scaling under high traffic with distributed resource location.

    Original languageEnglish
    Title of host publicationIFIP Advances in Information and Communication Technology
    EditorsNora Cuppens-Boulahia, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans
    PublisherSpringer New York LLC
    Pages44-51
    Number of pages8
    ISBN (Electronic)9783642554148
    DOIs
    Publication statusPublished - 2014
    Event29th IFIP TC 11 International Conference, SEC 2014 - Marrakesh, Morocco
    Duration: 2014 Jun 22014 Jun 4

    Publication series

    NameIFIP Advances in Information and Communication Technology
    Volume428
    ISSN (Print)1868-4238
    ISSN (Electronic)1868-422X

    Conference

    Conference29th IFIP TC 11 International Conference, SEC 2014
    Country/TerritoryMorocco
    CityMarrakesh
    Period14/6/214/6/4

    Keywords

    • Cloud computing
    • DDoS attack
    • Resource management

    ASJC Scopus subject areas

    • Information Systems
    • Computer Networks and Communications
    • Information Systems and Management

    Fingerprint

    Dive into the research topics of 'Lightweight resource management for DDoS traffic isolation in a cloud environment'. Together they form a unique fingerprint.

    Cite this