You are on page 1of 1

Distribute

Distribute
dd Denial
Denial
ofof Service
Service
Applicatio
Applicatio
nn Layer
Layer
Attacks
Attacks

Volumetri
Volumetri
cc Attacks
Attacks

Sweeping
Sweeping
Attack
Attack

ICMP
ICMP
Attack/Ad
Attack/Ad
aptive
aptive
Flooding
Flooding

Slow
Read
Slow Read
Attack
Attack

Ping
Ping Flood
Flood

SYN
SYN
Attack
Attack
MOTAG: A CLOUD BASED
MOVING TARGET DEFENSE

Resource
Resource
Exhaustio
Exhaustio
nn

Resource
Resource
Starvation
Starvation

UDP
Flood
UDP Flood

defensive mechanism against DDoS


attacks that leverages the redundancy
most modern systems exhibit in terms of
both network presence and

Ping
Ping ofof
Death
Death

Smurf
Smurf
Attack
Attack

HTTP
HTTP
Degradati
Nuke
Degradati
Nuke
GET/POST
GET/POST on Service
attack
on
Service
attack
Attack
Attack
RESOURCES--Infrastructure
resources, such as bandwidth and
connection pools, and computational
resources, such as memory and CPU
time.

MOTAG: A CLOUD_BASED MOVING TARGET DEFENSE


Moving-target defense mechanism insulates innocent clients from DDoS attacks
and identifies and quarantines malicious clients over time. Even under attack, the protected system
will
be available to most innocent clientsprotectingthe organizations reputation,
productivity, and revenue. Because MOTAG identifies malicious users solely
by detecting if the server is under attack,attackers cant evade detection by mimicking
normal users.

It creates a DDoS detection and mitigation system that can protect against both
volumetric and application-specific resource starvation and exhaustion attacks.

You might also like