What is it about?

The increased use of the internet for various time and mission critical applications makes the availability of services a top security concern. Thus, to protect these applications, we need a solution that should be able to provide high and predictable level of service. This motivates researchers to focus their interest towards the overlay based defensive approaches to provide sustainable performance to the legitimate clients, even in attack situations . Overlay networks are mainly used to protect communication on the top of existing insecure internet . These overlay based solutions provide a defensive approach, which focused to survive DDoS attacks instead of detecting and blocking it. But, these solutions are resource intensive and used only to secure time critical applications, which are difficult to replicate due to security concerns or their dynamic nature . Overlay based defense approaches itself suffer from many security related issues . Thus, despite many efforts a complete and secure solution is still a dream.

Featured Image

Read the Original

This page is a summary of: Overlay based defensive architecture to survive DDoS: A comparative study, Journal of High Speed Networks, January 2017, IOS Press,
DOI: 10.3233/jhs-170558.
You can read the full text:

Read

Contributors

The following have contributed to this page