Home // ICNS 2020, The Sixteenth International Conference on Networking and Services // View article
An Authentication Technique to Handle DDoS Attacks in Proxy-Based Architecture
Authors:
Poonam Dharam
Jarin Musarrat
Keywords: Distributed Denial of Service; proxy-based architecture; flooding attacks.
Abstract:
Recent years have witnessed an increase in Distributed Denial of Service (DDoS) attacks that overwhelm available network and backend server resources such as bandwidth, buffers, etc. To handle such attacks, proxy-based network architectures have been implemented to manage and Load Balance incoming traffic by spawning new servers in the event of unexpected rise in network traffic. However, DDoS attacks continue to persist with the attack target shifting from the main backend application servers to proxy servers. The redirection of users to one of the available proxy servers results in the discovery of their (proxy server’s) IP address. A botnet can then be used by the attacker to generate a huge amount of traffic and direct it to the proxy server, thus causing DDoS. In this paper, we propose an authentication technique to ensure the uniform distribution of the incoming requests and to avoid/drop the illegitimate requests from occupying servers’ resources. Our simulation results show that the proposed solution detects and handles DDoS attacks in an efficient manner.
Pages: 49 to 54
Copyright: Copyright (c) IARIA, 2020
Publication date: September 27, 2020
Published in: conference
ISSN: 2308-4006
ISBN: 978-1-61208-786-3
Location: Lisbon, Portugal
Dates: from September 27, 2020 to October 1, 2020