Skip to main content
Log in

A Cost Optimized Solution for Defending Against DDoS Attacks: An Analysis of a Multi-layered Architecture

  • Survey Article
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

Distributed denial-of-service (DDoS) attacks have grown to be a major concern for businesses and individuals who use the internet for operations and communications. DDoS attacks have the potential to seriously harm a website or online service, resulting in losses in money and reputational damage. In this research, we propose a cost-optimized and multi-layered DDoS protection architecture that utilizes a firewall, IDS/IPS, reverse proxy, and web server cluster. The architecture offers protection from a variety of DDoS attacks, including volumetric, network-layer, application-layer, and SSL attacks. We test the architecture in real-world scenarios and analyzed the results to determine how effective it is. We demonstrate that our architecture is capable of successfully mitigating DDoS attacks while maintaining the availability of the website to legitimate users through extensive testing and analysis of test results. Our research shows that the suggested architecture for DDoS protection is affordable and simple to integrate into existing systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Zhou W, Jia Y, Peng A, Zhang Y, Liu P. The effect of IoT new features on security and privacy: new threats, existing solutions, and challenges yet to be solved. IEEE Internet Things J. 2019;6:2. https://doi.org/10.1109/JIOT.2018.2847733.

    Article  Google Scholar 

  2. Raja G, Anbalagan S, Vijayaraghavan G, Theerthagiri S, Suryanarayan SV, Wu XW. SP-CIDS: secure and private collaborative IDS for VANETs. IEEE Trans Intel Trans Syst. 2021;22:7. https://doi.org/10.1109/TITS.2020.3036071.

    Article  Google Scholar 

  3. Dimolianis M, Pavlidis A, Maglaris V. Signature-based traffic classification and mitigation for DDoS attacks using programmable network data planes. IEEE Access. 2021;9:113061–76. https://doi.org/10.1109/ACCESS.2021.3104115.

    Article  Google Scholar 

  4. Gaylah KD, Vaghela RS. Mitigation and prevention methods for distributed denial-of-service attacks on network servers. Adv Smart Comp Infor Sec. 2022;11:70–82.

    Google Scholar 

  5. Smikle L. The impact of cybersecurity on the financial sector in Jamaica. J Financ Crime. 2022. https://doi.org/10.1108/JFC-12-2021-0259.

    Article  Google Scholar 

  6. Bhayo J, Hameed S, Shah SA. An efficient counter-based DDoS attack detection framework leveraging software defined IoT (SD-IoT). IEEE Access. 2020. https://doi.org/10.1109/ACCESS.2020.3043082.

    Article  Google Scholar 

  7. Liu T, Wang H, Zhang Y. A traffic anomaly detection scheme for non-directional denial of service attacks in software-defined optical network”. Comput Secur. 2022. https://doi.org/10.1016/j.cose.2021.102467.

    Article  Google Scholar 

  8. Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P. Network intrusion detection for IoT security based on learning techniques”. IEEE Commun Surv Tutor. 2019;21:3. https://doi.org/10.1109/COMST.2019.2896380.

    Article  Google Scholar 

  9. Li Y, Zhao Y, Li J, Yu X, Zhao Y, Zhang J. DDoS attack mitigation based on traffic scheduling in edge computing-enabled TWDM-PON. IEEE Access. 2021;9:166566–78. https://doi.org/10.1109/ACCESS.2021.3134671.

    Article  Google Scholar 

  10. Chaganti R, et al. A comprehensive review of denial of service attacks in blockchain ecosystem and open challenges. IEEE Access. 2022;10:96538–55. https://doi.org/10.1109/ACCESS.2022.3205019.

    Article  Google Scholar 

  11. Boyle P (2000) Global Information Assurance Certification Paper Distributed Denial of Service Attack Tools: trinoo and wintrinoo A Research Report Submitted in Partial Fulfilment of the SANS GIAC Program. [Online]. Available: http://www.giac.org/registration/gsec

  12. Erhan D, Anarim E. Hybrid DDoS detection framework using matching pursuit algorithm. IEEE Access. 2020;8:118912–23. https://doi.org/10.1109/ACCESS.2020.3005781.

    Article  Google Scholar 

  13. Rios VDM, Inacio PRM, Magoni D, Freire MM. Detection and mitigation of low-rate denial-of-service attacks: a survey. IEEE Access. 2022;10:76648–68. https://doi.org/10.1109/ACCESS.2022.3191430.

    Article  Google Scholar 

  14. Tayyab M, Belaton B, Anbar M. ICMPV6-based DOS and DDoS attacks detection using machine learning techniques, open challenges, and blockchain applicability: a review. IEEE Access. 2020;8:170529–47. https://doi.org/10.1109/ACCESS.2020.3022963.

    Article  Google Scholar 

  15. Wang Y-C, Wang Yi-C. Efficient and low-cost defense against distributed denial-of-service attacks in SDN-based networks. Int J Commun Syst. https://doi.org/10.1002/dac.4461.

  16. Brew SK, Ahene E. threat landscape across multiple cloud service providers using honeypots as an attack source. Front Cyber Sec. 2022. https://doi.org/10.1007/978-981-19-8445-7_11.

    Article  Google Scholar 

  17. Fotiadou K, Velivassaki TH, Voulkidis A, Skias D, Tsekeridou S, Zahariadis T. Network traffic anomaly detection via deep learning. Information (Switzerland). 2021;12:5. https://doi.org/10.3390/info12050215.

    Article  Google Scholar 

  18. Sharma NV, Kavita GA, Sharma S. Performance study of snort and suricata for intrusion detection system. IOP Conf Ser Mater Sci Eng. 2021;1099:1. https://doi.org/10.1088/1757-899x/1099/1/012009.

    Article  Google Scholar 

  19. Perez-Diaz JA, Valdovinos IA, Choo KKR, Zhu D. A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning. IEEE Access. 2020;8:155859–72. https://doi.org/10.1109/ACCESS.2020.3019330.

    Article  Google Scholar 

  20. Umam C, Handoko LB, Rizqi GM. implementation and analysis high availability network file system based server cluster. J Transf. 2018. https://doi.org/10.26623/transformatika.v16i1.841.

    Article  Google Scholar 

  21. Wang M, Lu Y, Qin J. A dynamic MLP-based DDoS attack detection method using feature selection and feedback. Comput Secur. 2020. https://doi.org/10.1016/j.cose.2019.101645.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kwitee D. Gaylah.

Ethics declarations

Conflict of Interest

On behalf of all authors, the corresponding author states that there is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Soft Computing Solutions for Secured & Smart Applications guest edited by Sridaran Rajagopal and Kalpesh Popat”.

Appendix

Appendix

See Figs. 6, 7

Fig. 6
figure 6

HTTP Flood blocked by Suricata

Fig. 7
figure 7

Wireshark traffic captured during the attack

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gaylah, K.D., Vaghela, R.S. & Zongo, WB.S. A Cost Optimized Solution for Defending Against DDoS Attacks: An Analysis of a Multi-layered Architecture. SN COMPUT. SCI. 4, 631 (2023). https://doi.org/10.1007/s42979-023-02001-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-023-02001-x

Keywords

Navigation