Dolus: Cyber Defense using Pretense against DDoS Attacks in Cloud Platforms

@article{Neupane2018DolusCD,
  title={Dolus: Cyber Defense using Pretense against DDoS Attacks in Cloud Platforms},
  author={R. Neupane and T. Neely and Nishant Chettri and Mark Vassell and Y. Zhang and Prasad Calyam and R. Durairajan},
  journal={Proceedings of the 19th International Conference on Distributed Computing and Networking},
  year={2018}
}
  • R. Neupane, T. Neely, +4 authors R. Durairajan
  • Published 2018
  • Computer Science
  • Proceedings of the 19th International Conference on Distributed Computing and Networking
  • Cloud-hosted services are being increasingly used in online businesses in e.g., retail, healthcare, manufacturing, entertainment due to benefits such as scalability and reliability. [...] Key Method Using foundations from pretense theory in child play, Dolus takes advantage of elastic capacity provisioning via 'quarantine virtual machines' and SDxI policy co-ordination across multiple network domains to deceive the attacker by creating a false sense of success. From the time gained through pretense initiation…Expand Abstract

    References

    Publications referenced by this paper.
    SHOWING 1-5 OF 5 REFERENCES
    GENI: A federated testbed for innovative network experiments
    • 473
    • Highly Influential
    • Open Access
    Frenetic: a network programming language
    • 646
    • Highly Influential
    • Open Access
    TCP SYN Flooding Attacks and Common Mitigations
    • W. Eddy
    • Computer Science, Geography
    • 2007
    • 272
    • Highly Influential
    • Open Access
    SlowHTTPTest
    • 2011
    SlowHTTPTest. Application Layer DoS attack
    • 2011