By Topic

Empirical Study of Tolerating Denial-of-Service Attacks with the Fosel Architecture

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Hakem Beitollahi ; Electr. Eng. Dept., Katholieke Univ. Leuven, Leuven, Belgium ; Geert Deconinck

Filtering techniques are one of the main approaches to protect applications from denial of service attacks (DoS).However filtering techniques suffer from two main challenges: a) the accuracy detection of DoS traffic and b) processing time. Fosel (filtering with the help of an overlay security layer) has been proposed to protect application sites from denial-of-service attacks. The Fosel architecture addresses how an efficient and well-suited filter can be designed to improve the filtering challenges. This paper explores the effectiveness of the Fosel architecture by implementing an experimental testbed. Experimental study shows that by employing the Fosel architecture, DoS attacks have a negligible chance to saturate the target by malicious packets. These results confirm simulation study of Fosel and provide an empirical evidence that Fosel can be used to tolerate DoS attacks.

Published in:

Network Computing and Applications, 2009. NCA 2009. Eighth IEEE International Symposium on

Date of Conference:

9-11 July 2009