Anycast and its potential for DDoS mitigation

Wouter Bastiaan de Vries, R. de Oliveira Schmidt, Aiko Pras

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)
    27 Downloads (Pure)

    Abstract

    IP anycast is widely being used to distribute essential Internet services, such as DNS, across the globe. One of the main reasons for doing so is to increase the redundancy of the service and reduce the impacts of the growing threat of DDoS attacks. IP anycast can be further used to mitigate DDoS attacks by confining the attack traffic to certain areas. This might cause the targeted service to become unavailable only to a fraction of its users. In this PhD research we aim at investigating how IP anycast can be optimized both statically and dynamically to support the mitigation of DDoS attacks.
    Original languageEnglish
    Title of host publicationManagement and Security in the Age of Hyperconnectivity. Proceedings of the 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016
    Place of PublicationSwitzerland
    PublisherSpringer
    Pages147-151
    Number of pages5
    ISBN (Print)978-3-319-39813-6
    DOIs
    Publication statusPublished - Jun 2016
    Event10th IFIP WG 6.6 International Conference on Management and Security in the Age of Hyperconnectivity, AIMS 2016 - Munich, Germany
    Duration: 20 Jun 201623 Jun 2016
    Conference number: 10

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer
    Volume9701
    ISSN (Print)0302-9743

    Conference

    Conference10th IFIP WG 6.6 International Conference on Management and Security in the Age of Hyperconnectivity, AIMS 2016
    Abbreviated titleAIMS 2016
    CountryGermany
    CityMunich
    Period20/06/1623/06/16

    Keywords

    • Internet
    • Measurements
    • DDoS
    • EWI-27755
    • Anycast
    • testbed

    Fingerprint Dive into the research topics of 'Anycast and its potential for DDoS mitigation'. Together they form a unique fingerprint.

    Cite this