{"id":95,"date":"2021-01-22T07:06:39","date_gmt":"2021-01-22T07:06:39","guid":{"rendered":"http:\/\/blog.rajorshibiswas.com\/?p=95"},"modified":"2021-01-22T07:06:39","modified_gmt":"2021-01-22T07:06:39","slug":"r-biswas-j-wu-and-y-chen-optimal-monitor-placement-policy-against-distributed-denial-of-service-attack-in-datacenter-2019-resilience-week-rws-san-antonio-tx-usa-2019-pp-64-70-doi-1","status":"publish","type":"post","link":"https:\/\/www.rajorshibiswas.com\/index.php\/95\/","title":{"rendered":"R. Biswas, J. Wu and Y. Chen, &#8220;Optimal Monitor Placement Policy Against Distributed Denial-of-Service Attack in Datacenter,&#8221; 2019 Resilience Week (RWS), San Antonio, TX, USA, 2019, pp. 64-70, doi: 10.1109\/RWS47064.2019.8972010."},"content":{"rendered":"<h1 class=\"document-title\">Optimal Monitor Placement Policy Against Distributed Denial-of-Service Attack in Datacenter<\/h1>\n<h3><a href=\"http:\/\/blog.rajorshibiswas.com\/wp-content\/uploads\/2021\/01\/08972010.pdf\">Download PDF<\/a>\u00a0 \u00a0 <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8972010\">IEEEexplore Link<\/a><\/h3>\n<p>&nbsp;<\/p>\n<div class=\"abstract-text row\">\n<div class=\"col-12\">\n<div class=\"u-mb-1\"><strong>Abstract:<\/strong><\/p>\n<div>A distributed denial-of-service (DDoS) attack is a cyber-attack in which multiple attackers send out a huge number of requests to exhaust the capacity of a server, so that it can no longer serve incoming requests. In this paper, we propose a mechanism to protect against DDoS attacks originated within a datacenter. Our system is composed of two parts: flow monitoring and traffic filtering. In flow monitoring, we formulate two problems: one for finding flow assignments to monitors and another for selecting best locations of monitors. The first problem considers that the locations of monitors are predefined by the cloud provider and we provide an optimal solution. The second problem considers that the locations of monitors are not predetermined and there is a limit on the number of monitors. We propose a greedy solution for the second problem. The traffic filtering is trivial, as the DDoS flow can be blocked from the hypervisor of the source virtual machine. We present simulation results that strengthen support for our solutions.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"u-pb-1 stats-document-abstract-publishedIn\" data-tealium_data=\"{&quot;docType&quot;: &quot;Conference&quot;}\"><strong>Published in:\u00a0<\/strong><a href=\"https:\/\/ieeexplore.ieee.org\/xpl\/conhome\/8961954\/proceeding\">2019 Resilience Week (RWS)<\/a><\/div>\n<div class=\"row u-pt-1\">\n<div class=\"col-6\">\n<div class=\"u-pb-1 doc-abstract-confdate\"><strong>Date of Conference:\u00a0<\/strong>4-7 Nov. 2019<\/div>\n<div class=\"u-pb-1 doc-abstract-dateadded\"><strong>Date Added to IEEE\u00a0<i>Xplore<\/i>:\u00a0<\/strong>30 January 2020<\/div>\n<div class=\"u-pb-1\">\n<div><strong><i class=\"icon-caret-abstract\"><\/i>ISBN Information:<\/strong><\/div>\n<\/div>\n<\/div>\n<div class=\"col-6\">\n<div class=\"u-pb-1\"><strong>INSPEC Accession Number:\u00a0<\/strong>19303458<\/div>\n<div class=\"u-pb-1 stats-document-abstract-doi\"><strong>DOI:\u00a0<\/strong><a href=\"https:\/\/doi.org\/10.1109\/RWS47064.2019.8972010\" target=\"_blank\" rel=\"noopener\">10.1109\/RWS47064.2019.8972010<\/a><\/div>\n<div class=\"u-pb-1 doc-abstract-publisher\"><span class=\"publisher-info-container black-tooltip\"><span class=\"title\">Publisher:\u00a0<\/span>IEEE<\/span><\/div>\n<div class=\"u-pb-1 doc-abstract-conferenceLoc\"><strong>Conference Location:\u00a0<\/strong>San Antonio, TX, USA, USA<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Optimal Monitor Placement Policy Against Distributed Denial-of-Service Attack in Datacenter Download PDF\u00a0 \u00a0 IEEEexplore Link &nbsp; Abstract: A distributed denial-of-service (DDoS) attack is a cyber-attack in which multiple attackers send out a huge number of requests to exhaust the capacity of a server, so that it can no longer serve incoming requests. In this paper, &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.rajorshibiswas.com\/index.php\/95\/\"> <span class=\"screen-reader-text\">R. Biswas, J. Wu and Y. Chen, &#8220;Optimal Monitor Placement Policy Against Distributed Denial-of-Service Attack in Datacenter,&#8221; 2019 Resilience Week (RWS), San Antonio, TX, USA, 2019, pp. 64-70, doi: 10.1109\/RWS47064.2019.8972010.<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6,4],"tags":[11],"_links":{"self":[{"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/posts\/95"}],"collection":[{"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/comments?post=95"}],"version-history":[{"count":1,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/posts\/95\/revisions"}],"predecessor-version":[{"id":97,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/posts\/95\/revisions\/97"}],"wp:attachment":[{"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/media?parent=95"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/categories?post=95"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/tags?post=95"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}