Detectability of Low-Rate HTTP Server DoS Attacks using Spectral Analysis

被引:16
作者
Brynielsson, Joel [1 ,2 ]
Sharma, Rishie [1 ]
机构
[1] KTH Royal Inst Technol, SE-10044 Stockholm, Sweden
[2] FOI Swedish Def Res Agcy, SE-16490 Stockholm, Sweden
来源
PROCEEDINGS OF THE 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2015) | 2015年
关键词
Low-rate DoS attack; attack simulator; Apache HTTP Server; attack detection; spectral analysis;
D O I
10.1145/2808797.2808810
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Denial-of-Service (DoS) attacks pose a threat to any service provider on the internet. While traditional DoS flooding attacks require the attacker to control at least as much resources as the service provider in order to be effective, so-called low-rate DoS attacks can exploit weaknesses in careless design to effectively deny a service using minimal amounts of network traffic. This paper investigates one such weakness found within version 2.2 of the popular Apache HTTP Server software. The weakness concerns how the server handles the persistent connection feature in HTTP 1.1. An attack simulator exploiting this weakness has been developed and shown to be effective. The attack was then studied with spectral analysis for the purpose of examining how well the attack could be detected. Similar to other papers on spectral analysis of low-rate DoS attacks, the results show that disproportionate amounts of energy in the lower frequencies can be detected when the attack is present. However, by randomizing the attack pattern, an attacker can efficiently reduce this disproportion to a degree where it might be impossible to correctly identify an attack in a real world scenario.
引用
收藏
页码:954 / 961
页数:8
相关论文
共 12 条
[1]  
*AP SOFTW FDN, AP HTTP SERV VERS 2
[2]  
Barford P, 2002, IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, P71, DOI 10.1145/637201.637210
[3]  
Chen Y, 2005, LCN 2005: 30th Conference on Local Computer Networks, Proceedings, P786
[4]   Spectral analysis of TCP flows for defense against Reduction-of-Quality attacks [J].
Chen, Yu ;
Hwang, Kai .
2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, :1203-+
[5]   Collaborative detection and filtering of shrew DDoS attacks using spectral analysis [J].
Chen, Yu ;
Hwang, Kai .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2006, 66 (09) :1137-1151
[6]  
Fielding R., 1999, Tech. Rep
[7]  
Gu Y., 2005, P INTERNET MEASUREME, P345, DOI 10.1145/1330107.1330148
[8]  
Kuzmanovic A, 2003, ACM SIGCOMM COMP COM, V33, P75
[9]  
Macía-Fernández G, 2008, LECT NOTES COMPUT SC, V5141, P197
[10]  
Priemer R., 1991, ADV SERIES ELECT COM