DDoS Defense by Offense

被引:34
作者
Walfish, Michael [1 ]
Vutukuru, Mythili
Balakrishnan, Hari
Karger, David
Shenker, Scott [2 ]
机构
[1] Univ Texas Austin, Dept Comp Sci, Austin, TX 78712 USA
[2] Univ Calif Berkeley, Berkeley, CA USA
来源
ACM TRANSACTIONS ON COMPUTER SYSTEMS | 2010年 / 28卷 / 01期
关键词
Design; Experimentation; Security; DoS attack; bandwidth; currency;
D O I
10.1145/1731060.1731063
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This article presents the design, implementation, analysis, and experimental evaluation of speak-up, a defense against application-level distributed denial-of-service (DDoS), in which attackers cripple a server by sending legitimate-looking requests that consume computational resources (e.g., CPU cycles, disk). With speak-up, a victimized server encourages all clients, resources permitting, to automatically send higher volumes of traffic. We suppose that attackers are already using most of their upload bandwidth so cannot react to the encouragement. Good clients, however, have spare upload bandwidth so can react to the encouragement with drastically higher volumes of traffic. The intended outcome of this traffic inflation is that the good clients crowd out the bad ones, thereby capturing a much larger fraction of the server's resources than before. We experiment under various conditions and find that speak-up causes the server to spend resources on a group of clients in rough proportion to their aggregate upload bandwidths, which is the intended result.
引用
收藏
页数:54
相关论文
共 75 条
[1]  
ABADI M, 2005, ACM T INTERNET TECHN, V5, P2
[2]  
AGARWAL S, 2003, RR04ATL013177
[3]  
Anderson T., 2003, P ACM WORKSH HOT TOP
[4]  
[Anonymous], 2005, TECHWEB NEWS
[5]  
[Anonymous], 2006, EWEEK
[6]  
[Anonymous], 2002, P 1 INT WORKSH PEER
[7]  
[Anonymous], PROOF OF WORK PROVES
[8]  
[Anonymous], 2007, P C NETW SYST DES IM
[9]  
[Anonymous], 2003, PITTSBURGH POST GAZE
[10]  
[Anonymous], CNET NEWS