Automatic Feedback Control for Graceful Degradation of Real-Time Services in the Face of an Attack

被引:2
作者
Vempati, Jagannadh [1 ]
Dantu, Ram [1 ]
机构
[1] Univ North Texas, Comp Sci & Engn, Denton, TX 76203 USA
来源
2018 4TH IEEE INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2018) | 2018年
关键词
D O I
10.1109/CIC.2018.00-37
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed denial of service (DDoS) attacks continue to pose a serious threat to various businesses and consumers. With the growth in the number of devices connected to the internet, these attacks continue to grow in number. Despite the availability of security tools, the attacks continue to happen and are causing various businesses to sweat. These tools may take anywhere from a few hours to a few days to counter the attacks, which is unacceptable. In this paper, we put forth a novel feedback control mechanism to minimize the effect of volumetric attacks such as DDoS. During an attack, the feedback control model detects and reduces the impact of the attack by maintaining the service level agreements (SLA) of the network service. The controller makes intelligent decisions to ensure the quality of service (QoS) metrics are gracefully degraded by tuning the micro-firewall rules such as the committed information rate and burst size. A proportional Integral (PI) controller is used as a closed-loop feedback controller to maintain the stability of the network in spite of an attack. This proposed architecture is verified in a lab setup, and we observe that we are able to minimize the degradation of the real-time service so that the user's quality of experience (QoE) is preserved. We validate the proposed architecture with a model generated by using the system identification technique. Results from the setup show that the closed-loop feedback control model stabilizes the network in real-time.
引用
收藏
页码:80 / 89
页数:10
相关论文
共 16 条
[1]  
[Anonymous], P 1 INT WORKSH GRAPH
[2]  
[Anonymous], 2004, Feedback Control of Computing Systems
[3]   An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
PATTERN RECOGNITION LETTERS, 2015, 51 :1-7
[4]  
Dantu R, 2007, IEEE T DEPEND SECURE, V4, P119, DOI [10.1109/Tait2007.1002, 10.1109/TDSC.2007.1002]
[5]  
De Cicco L., 2011, P 2 ANN ACM C MULTIM, P145
[6]   An Adaptive Video Streaming Control System: Modeling, Validation, and Performance Evaluation [J].
De Cicco, Luca ;
Mascolo, Saverio .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2014, 22 (02) :526-539
[7]  
De Cicco L, 2010, LECT NOTES COMPUT SC, V6389, P447
[8]   A Mathematical Model of the Skype VoIP Congestion Control Algorithm [J].
De Cicco, Luca ;
Mascolo, Saverio .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2010, 55 (03) :790-795
[9]  
Kuschnig R., 2010, MMSYS, P157
[10]  
Ljung L, 1998, APPL NUM HARM ANAL, P163