Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Attack Mitigation Service (AMS)

Design Innovation and Network Architecture for the Future Internet
The service provided by a Mitigation Service Provider, particularly by means of protective networking. An AMS relies upon one or several mitigators and scrubbing centers that are responsible for processing attack mitigation requests signaled by one or more several agents deployed in the protective networking infrastructure. Agents are responsible for monitoring and detecting any suspicious traffic that may correspond to an attack and to report such suspicious traffic to one of the mitigators they communicate with.
Published in Chapter:
From Protected Networks to Protective and Collaborative Networking: An Approach to a Globally Anticipative Attack Mitigation Framework for the Future Internet
Mohamed Boucadair (Orange S.A., France) and Christian Jacquenet (Orange S.A., France)
Copyright: © 2021 |Pages: 23
DOI: 10.4018/978-1-7998-7646-5.ch012
Abstract
Security has always been a major concern of network operators. Despite a pretty rich security toolbox that never ceased to improve over the years (filters, traffic wells, encryption techniques, and intrusion detection systems to name a few), attacks keep on increasing from both a numerical and amplitude standpoints. Such protean attacks demand an adapted security toolkit that should include techniques capable of not only detecting these attacks but also anticipating them even before they reach their target. Strengthening future networking infrastructures so that they become protective, instead of being “just” protected must thus become one of the key strategic objectives of network operators and service providers who ambition to rely upon robust, dynamic, security policy enforcement schemes to develop their business while retaining their existing customers. This chapter discusses the various security challenges that may be further exacerbated by future networking infrastructures. It also presents some of the techniques that are very likely to become cornerstones of protective networking.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR