Intelligent load balancing management in cloud web hosting: Evaluation criteria and methodology

Authors

DOI:

https://doi.org/10.18372/2073-4751.83.20551

Keywords:

cloud web hosting, load balancing, dynamic TLS management, SLA-aware scaling, dynamic benchmark

Abstract

This paper presents a methodology for selecting a software load balancer designed for cloud-cluster web hosting environments that use a large number of Transport Layer Security (TLS) certificates, perform their dynamic rotation, and integrate with an asynchronous network traffic analysis system. It is shown that traditional methods of evaluating load balancers, based on static testing of throughput and response time, do not reflect real operating conditions, where the system configuration constantly changes, block lists are updated, the composition of servers varies, and compliance with the Service Level Agreement (SLA) is required. Under such conditions, the load balancer should be considered an active control element capable of handling tens of thousands of certificates, applying configuration changes without process restarts, updating internal in-memory data structures, and providing reliable telemetry for automatic scaling systems. A new evaluation approach is proposed, based on the concept of a “dynamic benchmark,” which combines load testing with gradual configuration complexity: increasing the number of domains, updating certificates, applying new block list entries, and changing cluster topology. Key evaluation criteria are defined, including scalability, resilience under dynamic changes, flexibility for implementing custom logic, manageability, and completeness of observability. The developed methodology eliminates the existing gap between academic research and the practical operation of modern hosting platforms and creates a foundation for further experimental validation and the development of a next-generation load balancer prototype focused on reliability, adaptability, and intelligent load management.

References

Chizhov A., Fesenko A. Web hosting companies’ client solutions: A study of a strategic standpoint // Corporate & Business Strategy Review. – 2025. – Vol. 6, No. 1. – P. 421-429. – DOI: 10.22495/cbsrv6i1siart18.

HAProxy Runtime API Reference [Electronic resource]. – Access mode: https://www.haproxy.com/documentation/haproxy-runtime-api/reference/ (accessed 04.11.2025).

Envoy Proxy. Secret discovery service (SDS) [Electronic resource]. – Access mode: https://www.envoyproxy.io/docs/envoy/latest/configuration/security/secret (accessed 04.11.2025).

Dudnik, A., Fesenko, A., & Chyzov, O. (2025). Method of web application protection based on asynchronous request analysis: Utility Model Patent of Ukraine No. UA 160974 U. Registered 22 October 2025. Kyiv: Ukrainian National Office of Intellectual Property and Innovation.

Chizhov A., Fesenko A., Ziuziun V., Basshykyzy D. “Cloud Shared Hosting DDoS Resistance and Potential Ways of Protection” // CEUR Workshop Proceedings “Cyber Hygiene & Conflict Management in Global Information Networks 2024”. – ISSN 1613-0073. – Vol. 3925. – P. 13–23. – Access mode: https://ceur-ws.org/Vol-3925/ (accessed 04.11.2025).

Pereira D. S., Bezerra L. F. V., Nunes J. S., Barroca Filho I. M., Lopes F. A. S. Performance Efficiency Evaluation based on ISO/IEC 25010:2011 applied to a Case Study on Load Balance and Resilient // Workshop de Testes e Tolerância a Falhas (WTF) 2023. – DOI: 10.5753/wtf.2023.787.

Johansson A. HTTP Load Balancing Performance Evaluation of HAProxy, NGINX, Traefik and Envoy with the Round-Robin Algorithm : Bachelor Degree Project in Science with a major in Informatics, G2E, 30 ECTS / A. Johansson ; supervisor J. Zaxmy, examiner T. Fischer ; University of Skövde. – Skövde, Sweden, 2022. – 54 p.

nginx documentation – njs. [Electronic resource]. – Access mode: https://nginx.org/en/docs/njs/ (accessed 04.11.2025).

Traefik Labs. ACME: certificate resolvers for TLS / Traefik Proxy [Electronic resource]. – Access mode: https://doc.traefik.io/traefik/reference/install-configuration/tls/certificate-resolvers/acme/ (accessed 04.11.2025).

Caddy – Automatic HTTPS [Electronic resource]. – Access mode: https://caddyserver.com/docs/automatic-https (accessed 04.11.2025).

Envoy Proxy. Wasm [Electronic resource]. – Access mode: https://www.envoyproxy.io/docs/envoy/latest/intro/arch_overview/advanced/wasm (accessed 04.11.2025).

Chovanec M., Hasin M., Havrilla M., Chovancová E. Detection of HTTP DDoS Attacks Using NFStream and TensorFlow // Applied Sciences. – 2023. – Vol. 13, No. 11. – Article 6671. – DOI: 10.3390/app13116671.

Najafimehr M., Zarifzadeh S., Mostafavi S. DDoS attacks and machine-learning-based detection methods: A survey and taxonomy // Engineering Reports. – 2023. – Vol. 5. – Article e12697. – DOI: 10.1002/eng2.12697.

Downloads

Published

2025-12-19

Issue

Section

Статті