Defense techniques for low-rate DoS attacks against application servers

被引:33
作者
Macia-Fernandez, Gabriel [1 ]
Rodriguez-Gomez, Rafael A. [1 ]
Diaz-Verdejo, Jesus E. [1 ]
机构
[1] Univ Granada, ETS Comp & Telecommun Engn, Dept Signal Theory Telemat & Commun, E-18071 Granada, Spain
关键词
Denial of service; Low-rate; Defense; Network security; QUALITY ROQ ATTACKS; REDUCTION; MECHANISM;
D O I
10.1016/j.comnet.2010.05.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Low-rate denial of service (DoS) attacks have recently emerged as new strategies for denying networking services. Such attacks are capable of discovering vulnerabilities in protocols or applications behavior to carry out a DoS with low-rate traffic. In this paper, we focus on a specific attack: the low-rate DoS attack against application servers, and address the task of finding an effective defense against this attack. Different approaches are explored and four alternatives to defeat these attacks are suggested. The techniques proposed are based on modifying the way in which an application server accepts incoming requests. They focus on protective measures aimed at (i) preventing an attacker from capturing all the positions in the incoming queues of applications, and (ii) randomizing the server operation to eliminate possible vulnerabilities due to predictable behaviors. We extensively describe the suggested techniques, discussing the benefits and drawbacks for each under two criteria: the attack efficiency reduction obtained, and the impact on the normal operation of the server. We evaluate the proposed solutions in a both a simulated and a real environment, and provide guidelines for their implementation in a production system. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:2711 / 2727
页数:17
相关论文
共 26 条
[1]   Scalable Network-Layer Defense Against Internet Bandwidth-Flooding Attacks [J].
Argyraki, Katerina ;
Cheriton, David R. .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2009, 17 (04) :1284-1297
[2]  
Chen YF, 2007, PROCEEDINGS OF 2007 IEEE INTERNATIONAL CONFERENCE ON GREY SYSTEMS AND INTELLIGENT SERVICES, VOLS 1 AND 2, P612
[3]  
Fall Kevin., 2009, The ns manual
[4]  
Guirguis M, 2005, IEEE INFOCOM SER, P1362
[5]   Exploiting the transients of adaptation for RoQ attacks on Internet resources [J].
Guirguis, M ;
Bestavros, A ;
Matta, I .
12TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS - PROCEEDINGS, 2004, :184-195
[6]   Reduction of quality (RoQ) attacks on dynamic load balancers: Vulnerability assessment and design tradeoffs [J].
Guirguis, Mina ;
Bestavros, Azer ;
Matta, Ibrahim ;
Zhang, Yuting .
INFOCOM 2007, VOLS 1-5, 2007, :857-+
[7]   Adversarial exploits of end-systems adaptation dynamics [J].
Guirguis, Mina ;
Bestavros, Azer ;
Matta, Ibrahim ;
Zhang, Yuting .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2007, 67 (03) :318-335
[8]  
KEOGH E, 2002, P 28 VLDB C CHIN
[9]  
KUZMANOVIC A, 2003, P ACM SIGCOMM, P75
[10]   Evaluation of a low-rate DoS attack against iterative servers [J].
Macia-Fernandez, Gabriel ;
Diaz-Verdejo, Jesus E. ;
Garcia-Teodoro, Pedro .
COMPUTER NETWORKS, 2007, 51 (04) :1013-1030