This paper proposes a novel proxy network topology. The proposed network topology exhibits several attributes that strengthen the proxy network's resistance to DoS attacks. Additionally, a novel reconfiguration algorithm for a class of proxy network topologies is proposed, and shown to decrease the topologies' vulnerability to DoS attacks. Proxy networks enable applications to communicate with
... [Show full abstract] users without disclosing their IP's. An application's resistance to DoS attacks is improved by hiding it behind a proxy network. We evaluate the proposed topology's fault tolerance and its effectiveness in the resistance to DoS attacks