Research Article
A Comparative Analysis of Various Deployment Based DDoS Defense Schemes
@INPROCEEDINGS{10.1007/978-3-642-37949-9_53, author={Karanbir Singh and Navdeep Kaur and Deepa Nehra}, title={A Comparative Analysis of Various Deployment Based DDoS Defense Schemes}, proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers}, proceedings_a={QSHINE}, year={2013}, month={7}, keywords={DDoS Network Security Distributed Defense Deployment}, doi={10.1007/978-3-642-37949-9_53} }
- Karanbir Singh
Navdeep Kaur
Deepa Nehra
Year: 2013
A Comparative Analysis of Various Deployment Based DDoS Defense Schemes
QSHINE
Springer
DOI: 10.1007/978-3-642-37949-9_53
Abstract
Distributed denial of service attack is a major threat to the availability of internet services and resources. The current internet infrastructure is vulnerable to DDoS attacks and has no built in mechanism to defend against them. The main task of the defense system is to accurately detect and respond against DDoS attacks. A variety of DDoS defense solutions are available but having difficulties to choose among them. There are different places in the internet, where a defense system can be deployed. The various points in the internet where defense systems can be deployed are identified and discussed here. A comparative analysis of different defense schemes corresponding to deployment points are also carried out. The main aim of this review paper is to provide an individual or academia to insight into various possible deployments locations suitable for DDoS defense system. It helps them to choose an appropriate defense method and suitable deployment location.