{"id":92,"date":"2021-01-22T07:03:43","date_gmt":"2021-01-22T07:03:43","guid":{"rendered":"http:\/\/blog.rajorshibiswas.com\/?p=92"},"modified":"2021-01-22T07:03:43","modified_gmt":"2021-01-22T07:03:43","slug":"r-biswas-j-wu-and-a-srinivasan-cost-aware-optimal-filter-assignment-policy-against-distributed-denial-of-service-attack-2019-resilience-week-rws-san-antonio-tx-usa-2019-pp-57-63-doi","status":"publish","type":"post","link":"https:\/\/www.rajorshibiswas.com\/index.php\/92\/","title":{"rendered":"R. Biswas, J. Wu and A. Srinivasan, &#8220;Cost-Aware Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack,&#8221; 2019 Resilience Week (RWS), San Antonio, TX, USA, 2019, pp. 57-63, doi: 10.1109\/RWS47064.2019.8972008."},"content":{"rendered":"<h1 class=\"document-title\">Cost-Aware Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack<\/h1>\n<div class=\"u-mb-1 u-mt-05 cite-this-btn-wrapper\"><\/div>\n<h3><a href=\"http:\/\/blog.rajorshibiswas.com\/wp-content\/uploads\/2021\/01\/08972008.pdf\">Download PDF<\/a>\u00a0 \u00a0<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8972008\">IEEEexplore Link<\/a><\/h3>\n<p>&nbsp;<\/p>\n<div class=\"abstract-text row\">\n<div class=\"col-12\">\n<div class=\"u-mb-1\"><strong>Abstract:<\/strong><\/p>\n<div>In a denial-of-service (DoS) attack, the attacker sends out a huge number of requests to exhaust the capacity of a server. The victim cannot serve incoming requests and then DoS occurs. When the attacker stops sending requests, the victim gets back to working state. The most devastating distributed DoS attack is performed by bots, malicious programs that reside on the affected user computers. By using a special type of router called filter router (FR), the victim can protect itself. A server needs to send filters to FR for blocking attack traffic. A filter blocks both attack and user traffic which are destined for the victim at the FR. The victim needs to select a subset of FRs wisely to minimize the blockage of users. The victim&#8217;s operation is not hampered if the total incoming traffic does not exceed its capacity. In this paper, we formulate a problem for selecting FRs given a budget on the number of filters. The problem considers that the victim has limited incoming bandwidth and we provide an optimal dynamic programming solution. We conduct extensive simulation in different settings. Our simulation results strengthen support for our solutions.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"u-pb-1 stats-document-abstract-publishedIn\" data-tealium_data=\"{&quot;docType&quot;: &quot;Conference&quot;}\"><strong>Published in:\u00a0<\/strong><a href=\"https:\/\/ieeexplore.ieee.org\/xpl\/conhome\/8961954\/proceeding\">2019 Resilience Week (RWS)<\/a><\/div>\n<div class=\"row u-pt-1\">\n<div class=\"col-6\">\n<div class=\"u-pb-1 doc-abstract-confdate\"><strong>Date of Conference:\u00a0<\/strong>4-7 Nov. 2019<\/div>\n<div class=\"u-pb-1 doc-abstract-dateadded\"><strong>Date Added to IEEE\u00a0<i>Xplore<\/i>:\u00a0<\/strong>30 January 2020<\/div>\n<div class=\"u-pb-1\">\n<div><strong><i class=\"icon-caret-abstract\"><\/i>ISBN Information:<\/strong><\/div>\n<\/div>\n<\/div>\n<div class=\"col-6\">\n<div class=\"u-pb-1\"><strong>INSPEC Accession Number:\u00a0<\/strong>19303461<\/div>\n<div class=\"u-pb-1 stats-document-abstract-doi\"><strong>DOI:\u00a0<\/strong><a href=\"https:\/\/doi.org\/10.1109\/RWS47064.2019.8972008\" target=\"_blank\" rel=\"noopener\">10.1109\/RWS47064.2019.8972008<\/a><\/div>\n<div class=\"u-pb-1 doc-abstract-publisher\"><span class=\"publisher-info-container black-tooltip\"><span class=\"title\">Publisher:\u00a0<\/span>IEEE<\/span><\/div>\n<div class=\"u-pb-1 doc-abstract-conferenceLoc\"><strong>Conference Location:\u00a0<\/strong>San Antonio, TX, USA, USA<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cost-Aware Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack Download PDF\u00a0 \u00a0IEEEexplore Link &nbsp; Abstract: In a denial-of-service (DoS) attack, the attacker sends out a huge number of requests to exhaust the capacity of a server. The victim cannot serve incoming requests and then DoS occurs. When the attacker stops sending requests, the victim gets &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.rajorshibiswas.com\/index.php\/92\/\"> <span class=\"screen-reader-text\">R. Biswas, J. Wu and A. Srinivasan, &#8220;Cost-Aware Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack,&#8221; 2019 Resilience Week (RWS), San Antonio, TX, USA, 2019, pp. 57-63, doi: 10.1109\/RWS47064.2019.8972008.<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6,4],"tags":[11],"_links":{"self":[{"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/posts\/92"}],"collection":[{"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/comments?post=92"}],"version-history":[{"count":1,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/posts\/92\/revisions"}],"predecessor-version":[{"id":94,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/posts\/92\/revisions\/94"}],"wp:attachment":[{"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/media?parent=92"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/categories?post=92"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/tags?post=92"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}