The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Security Considerations of SDN Networks During DDoS Attacks in Load Balancing
|
Author(s): Adrija Das (School of Computer Engineering, KIIT (Deemed to Be) University, Bhubaneswar, India), Pratyasha Nanda (School of Computer Engineering, KIIT (Deemed to Be) University, Bhubaneswar, India), Ritika Jain (School of Computer Engineering, KIIT (Deemed to Be) University, Bhubaneswar, India), Tanisha Saini (School of Computer Engineering, KIIT (Deemed to Be) University, Bhubaneswar, India), Sneha Bhaskar (School of Computer Engineering, KIIT (Deemed to Be) University, Bhubaneswar, India)and Hitesh Mohapatra (School of Computer Engineering, KIIT (Deemed to Be) University, Bhubaneswar, India)
Copyright: 2025
Pages: 18
Source title:
Human Impact on Security and Privacy: Network and Human Security, Social Media, and Devices
Source Author(s)/Editor(s): Rajeev Kumar (Moradabad Institute of Technology, India), Saurabh Srivastava (Moradabad Institute of Technology, India)and Ahmed A. Elngar (Beni-Suef University, Egypt)
DOI: 10.4018/979-8-3693-9235-5.ch007
Purchase
|
Abstract
Cloud computing deals with the dynamic allocation of resources on demand from any location. Load balancing is the phenomenon of ensuring the distribution of traffic and the operation of loads on multiple servers. There are security considerations where the load balancers are potential targets for Distributed Denial of Service (DDoS) attacks. This occurs when the attacker overwhelms the system with a flood of traffic, causing it to become unresponsive. The paper discusses the security challenges and attacks that affect workload distribution across servers dealing with access control mechanisms and concerns about multi-tenancy risks. The analysis involves identifying attacks in load-balancing systems from pre-existing frameworks by utilizing tools like Snort, Wireshark, and MATLAB for DDoS attacks. Furthermore, the paper does a comparative study on the established works. It addresses the best mitigation strategies for different types of DDoS attacks, such as Smurfing and TCP-SYN attacks, thus enhancing resilience with SDN architecture and multi-layered defense mechanisms.
Related Content
Harish Chandra Verma, Saurabh Srivastava.
© 2025.
12 pages.
|
Lingala Thirupathi, B. Vasundara, Dheeraj Sundaragiri, Vijaya Bhaskar Ch, Ravi Gugulothu, Radhika Pulyala.
© 2025.
26 pages.
|
Mohd Saleem, Rajeev Kumar, Chanchal Chawla, Mahendra Singh.
© 2025.
14 pages.
|
Nobhonil Roy Choudhury, Shyamalendu Paul.
© 2025.
22 pages.
|
Abhay Bhatia, Anil Kumar, Devendra Sood.
© 2025.
32 pages.
|
Aparna Datta, Akash Mondal, Arunima Sarkar.
© 2025.
16 pages.
|
Adrija Das, Pratyasha Nanda, Ritika Jain, Tanisha Saini, Sneha Bhaskar, Hitesh Mohapatra.
© 2025.
18 pages.
|
|
|