(function(doc, html, url) { var widget = doc.createElement("div"); widget.innerHTML = html; var script = doc.currentScript; // e = a.currentScript; if (!script) { var scripts = doc.scripts; for (var i = 0; i < scripts.length; ++i) { script = scripts[i]; if (script.src && script.src.indexOf(url) != -1) break; } } script.parentElement.replaceChild(widget, script); }(document, '

Defensive Architectures to Survive DDoS Attack

What is it about?

The increased use of the internet for various time and mission critical applications makes the availability of services a top security concern. Thus, to protect these applications, we need a solution that should be able to provide high and predictable level of service. This motivates researchers to focus their interest towards the overlay based defensive approaches to provide sustainable performance to the legitimate clients, even in attack situations . Overlay networks are mainly used to protect communication on the top of existing insecure internet . These overlay based solutions provide a defensive approach, which focused to survive DDoS attacks instead of detecting and blocking it. But, these solutions are resource intensive and used only to secure time critical applications, which are difficult to replicate due to security concerns or their dynamic nature . Overlay based defense approaches itself suffer from many security related issues . Thus, despite many efforts a complete and secure solution is still a dream.

Read more on Kudos…
The following have contributed to this page:
Ramanpreet Kaur
' ,"url"));