A Theoretical Model for Real-Time Resource Monitoring for Securing Computing Infrastructure against DoS and DDoS Attacks
Main Article Content
Abstract
–The challenge of denial of service (DoS) attacks and its distributed (DDoS) variants have immensely clogged the pathway of growth and development of the Internet and its reliant technologies, as well as computing infrastructure in general. This type of attacks have gradually carved a niche for itself as one of the most obnoxious forms of attacks to computing infrastructure in recent times. Many existing techniques for detecting, and mitigating the impact and extent of damage of this kind of attacks already exist. Most of them focus on monitoring and classifying every traffic that goes through the network as either “genuine†or “maliciousâ€. However, due to the speed and overwhelming pressure of this attack, it is becoming increasingly difficult for most of these techniques to stand in the face of real-world attacks. This research proposes a more resource-centric technique for monitoring computing resources against DoS and DDoS attacks which focuses on monitoring the rate of consumption of critical computing resources, in real-time, by various processes, tasks and traffic that bother on them, creating room for prescribed actions to be taken in order to forestall full DoS and DDoS breaches before they occur.
Keywords – DoS, DDoS, Computing Infrastructure, Real-Time Monitoring, Cloud Computing
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.