A DDoS Mitigation System with Multi-Stage Detection and Text-Based Turing Testing in Cloud Computing

被引:19
作者
Huang, Vincent Shi-Ming [1 ]
Huang, Robert [1 ]
Chiang, Ming [1 ]
机构
[1] Indistrial Technol Res Inst, Cloud Comp Ctr Mobile Applicat, Hsinchu, Taiwan
来源
2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA) | 2013年
关键词
DDoS; Multi-Stage Detection; Turing Testing; CAPTCHA; Cloud Computing; Text-based Question;
D O I
10.1109/WAINA.2013.94
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An important trend in the computer science is towards Cloud Computing and we can see that many cloud services are proposed and developed in the Internet. An important cloud service like the IaaS as AWS EC2 can help many companies to build data centers with high performance computing resources and reduce the cost of maintaining the computing hardware. A data center which provides internet service may suffer from many security risks including Distributed Denial of Service (DDOS) attack. We believe that most of the cloud services, like Gmail, Dropbox, Google Document, and etc., are based on HTTP connection. Hence, we aim at HTTP-based connection and propose a low reflection ratio mitigation system against the DDoS attacks. Our system is in the front of an IaaS that all of the virtual data centers in the IaaS are our protection targets. Our system consists of Source Checking, Counting, Attack Detection, Turing Test, and Question Generation modules. We provide a multi-stage detection to more precisely detect the possible attackers and a text-based turing test with question generation module to challenge the suspected requesters who are detected by the detection module. We implemented the proposed system and evaluated the performance to show that our system works efficiently to mitigate the DDoS traffic from the Internet.
引用
收藏
页码:655 / 662
页数:8
相关论文
共 25 条
  • [1] [Anonymous], 2006, Proceedings of the 4th ACM Workshop on Formal Methods in Security
  • [2] [Anonymous], 2008, SOUPS 2008 P 4 S US
  • [3] Asudeh A., 2009, Lexical-Functional Grammar- The Oxford Handbook of Linguistic Analysis
  • [4] Buyya R, 2010, LECT NOTES COMPUT SC, V6081, P13
  • [5] Chen W., 2006, Networking, international conference on systems and international conference on mobile communications and learning technologies, P38
  • [6] Chew M, 2004, LECT NOTES COMPUT SC, V3225, P268
  • [7] Datta R., 2005, 13th Annual ACM International Conference on Multimedia, P331, DOI 10.1145/1101149.1101218
  • [8] Giroire F, 2009, LECT NOTES COMPUT SC, V5758, P326, DOI 10.1007/978-3-642-04342-0_17
  • [9] Goth G, 2007, IEEE INTERNET COMPUT, V11, P7, DOI [10.1109/MIC.2007.32, 10.1109/MIC.2007.87]
  • [10] Sequenced Tagged Captcha: Generation and its Analysis
    Gupta, Anand
    Jain, Ashish
    Raj, Aditya
    Jain, Abhimanyu
    [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1286 - +