Holistic DDoS mitigation using NFV
Title | Holistic DDoS mitigation using NFV |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Alharbi, T., Aljuhani, A., Liu, Hang |
Conference Name | 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC) |
Publisher | IEEE |
ISBN Number | 978-1-5090-4228-9 |
Keywords | cloud computing, composability, Computer crime, computer network security, cyber-attack, data protection, DDoS, DDoS attack mitigation, DDoS traffic, distributed denial-of-service, edge computing, Hardware, holistic DDoS attack mitigation, Human Behavior, Metrics, network function virtualization, networking service models, NFV, Organizations, privacy, pubcrawl, Resiliency, security, telecommunication traffic, virtualisation |
Abstract | Distributed Denial of Service (DDoS) is a sophisticated cyber-attack due to its variety of types and techniques. The traditional mitigation method of this attack is to deploy dedicated security appliances such as firewall, load balancer, etc. However, due to the limited capacity of the hardware and the potential high volume of DDoS traffic, it may not be able to defend all the attacks. Therefore, cloud-based DDoS protection services were introduced to allow the organizations to redirect their traffic to the scrubbing centers in the cloud for filtering. This solution has some drawbacks such as privacy violation and latency. More recently, Network Functions Virtualization (NFV) and edge computing have been proposed as new networking service models. In this paper, we design a framework that leverages NFV and edge computing for DDoS mitigation through two-stage processes. |
URL | https://ieeexplore.ieee.org/document/7868480 |
DOI | 10.1109/CCWC.2017.7868480 |
Citation Key | alharbi_holistic_2017 |
- holistic DDoS attack mitigation
- virtualisation
- telecommunication traffic
- security
- Resiliency
- pubcrawl
- privacy
- Organizations
- NFV
- networking service models
- network function virtualization
- Metrics
- Human behavior
- Cloud Computing
- Hardware
- edge computing
- distributed denial-of-service
- DDoS traffic
- DDoS attack mitigation
- DDoS
- Data protection
- cyber-attack
- computer network security
- Computer crime
- composability