{"id":63,"date":"2021-01-22T06:21:23","date_gmt":"2021-01-22T06:21:23","guid":{"rendered":"http:\/\/blog.rajorshibiswas.com\/?p=63"},"modified":"2021-01-22T06:29:28","modified_gmt":"2021-01-22T06:29:28","slug":"r-biswas-and-j-wu-filter-assignment-policy-against-distributed-denial-of-service-attack-in-24th-international-conference-on-parallel-and-distributed-systems-2018","status":"publish","type":"post","link":"https:\/\/www.rajorshibiswas.com\/index.php\/63\/","title":{"rendered":"R. Biswas and J. Wu, &#8220;Filter Assignment Policy Against Distributed Denial-of-Service Attack,&#8221; 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), Singapore, Singapore, 2018, pp. 537-544, doi: 10.1109\/PADSW.2018.8644584."},"content":{"rendered":"<h3><strong>Title:\u00a0 Filter Assignment Policy Against Distributed Denial-of-Service Attack<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p><strong style=\"font-size: 16px;\">Abstract:<\/strong><\/p>\n<div class=\"abstract-text row\">\n<div class=\"col-12\">\n<div class=\"u-mb-1\">\n<div>A denial-of-service (DoS) attack is a cyber-attack in which the attacker sends out a huge number of requests to exhaust the capacity of a server, so that it can no longer serve incoming requests and DoS occurs. The most devastating distributed DoS attack is performed by malicious programs called bots. With the help of a special type of router called filter router, the victim can protect itself and reduce useless congestion in the network. A server can send out filters to filter routers for blocking attack traffic. The victim needs to select a subset of filter routers wisely to minimize attack traffic and blockage of legitimate users (LUs). In this paper, we formulate two problems for selecting filter routers given a constraint on the number of filters. The first problem considers the source-based filter and we provide greedy approximation solutions. The second problem considers the destination-based filter and how to minimize total amount of attack traffic and blocked LUs. We propose a dynamic programming solution for the second problem. We present simulation results comparing the proposed solutions with a naive approach. Our simulation results strengthen support for our solutions.<\/div>\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"u-pb-1 stats-document-abstract-publishedIn\" data-tealium_data=\"{&quot;docType&quot;: &quot;Conference&quot;}\"><strong>Published in:\u00a0<\/strong><a href=\"https:\/\/ieeexplore.ieee.org\/xpl\/conhome\/8635632\/proceeding\">2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS)<\/a><\/div>\n<div class=\"row u-pt-1\">\n<div class=\"col-6\">\n<div class=\"u-pb-1 doc-abstract-confdate\"><strong>Date of Conference:\u00a0<\/strong>11-13 Dec. 2018<\/div>\n<div class=\"u-pb-1 doc-abstract-dateadded\"><strong>Date Added to IEEE\u00a0<i>Xplore<\/i>:\u00a0<\/strong>21 February 2019<\/div>\n<div class=\"u-pb-1\">\n<div><strong>ISBN Information:<a href=\"http:\/\/blog.rajorshibiswas.com\/wp-content\/uploads\/2021\/01\/08644584.pdf\">08644584<\/a><\/strong><\/div>\n<\/div>\n<div class=\"u-pb-1\">\n<div>\n<div><strong>Print on Demand(PoD) ISSN:<\/strong>\u00a01521-9097<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"col-6\">\n<div class=\"u-pb-1\"><strong>INSPEC Accession Number:\u00a0<\/strong>18485231<\/div>\n<div class=\"u-pb-1 stats-document-abstract-doi\"><strong>DOI:\u00a0<\/strong><a href=\"https:\/\/doi.org\/10.1109\/PADSW.2018.8644584\" target=\"_blank\" rel=\"noopener\">10.1109\/PADSW.2018.8644584<\/a><\/div>\n<div class=\"u-pb-1 doc-abstract-publisher\"><span class=\"publisher-info-container black-tooltip\"><span class=\"title\">Publisher:\u00a0<\/span>IEEE<\/span><\/div>\n<div class=\"u-pb-1 doc-abstract-conferenceLoc\"><strong>Conference Location:\u00a0<\/strong>Singapore, Singapore, Singapore<\/div>\n<\/div>\n<\/div>\n<div><\/div>\n<div><a href=\"http:\/\/blog.rajorshibiswas.com\/wp-content\/uploads\/2021\/01\/08644584.pdf\">Download PDF<\/a> \u00a0\u00a0 \u00a0\u00a0<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8644584\">\u00a0IEEE explore Link<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Title:\u00a0 Filter Assignment Policy Against Distributed Denial-of-Service Attack &nbsp; Abstract: A denial-of-service (DoS) attack is a cyber-attack in which the attacker sends out a huge number of requests to exhaust the capacity of a server, so that it can no longer serve incoming requests and DoS occurs. The most devastating distributed DoS attack is performed &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.rajorshibiswas.com\/index.php\/63\/\"> <span class=\"screen-reader-text\">R. Biswas and J. Wu, &#8220;Filter Assignment Policy Against Distributed Denial-of-Service Attack,&#8221; 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), Singapore, Singapore, 2018, pp. 537-544, doi: 10.1109\/PADSW.2018.8644584.<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6,4],"tags":[10],"_links":{"self":[{"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/posts\/63"}],"collection":[{"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/comments?post=63"}],"version-history":[{"count":5,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/posts\/63\/revisions"}],"predecessor-version":[{"id":71,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/posts\/63\/revisions\/71"}],"wp:attachment":[{"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/media?parent=63"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/categories?post=63"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/tags?post=63"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}