DocumentCode :
3079888
Title :
CALD: Surviving Various Application-Layer DDoS Attacks That Mimic Flash Crowd
Author :
Wen, Sheng ; Jia, Weijia ; Zhou, Wei ; Zhou, Wanlei ; Xu, Chuan
Author_Institution :
Central South Univ., Changsha, China
fYear :
2010
fDate :
1-3 Sept. 2010
Firstpage :
247
Lastpage :
254
Abstract :
Distributed denial of service (DDoS) attack is a continuous critical threat to the Internet. Derived from the low layers, new application-layer-based DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. The case may be more serious when such attacks mimic or occur during the flash crowd event of a popular Website. In this paper, we present the design and implementation of CALD, an architectural extension to protect Web servers against various DDoS attacks that masquerade as flash crowds. CALD provides real-time detection using mess tests but is different from other systems that use resembling methods. First, CALD uses a front-end sensor to monitor the traffic that may contain various DDoS attacks or flash crowds. Intense pulse in the traffic means possible existence of anomalies because this is the basic property of DDoS attacks and flash crowds. Once abnormal traffic is identified, the sensor sends ATTENTION signal to activate the attack detection module. Second, CALD dynamically records the average frequency of each source IP and check the total mess extent. Theoretically, the mess extent of DDoS attacks is larger than the one of flash crowds. Thus, with some parameters from the attack detection module, the filter is capable of letting the legitimate requests through but the attack traffic stopped. Third, CALD may divide the security modules away from the Web servers. As a result, it keeps maximum performance on the kernel web services, regardless of the harassment from DDoS. In the experiments, the records from www.sina.com and www.taobao.com have proved the value of CALD.
Keywords :
IP networks; Kalman filters; Web services; hypermedia; security of data; telecommunication traffic; transport protocols; ATTENTION signal; CALD; HTTP request; IP network; Internet threat; Kalman filter; Web server; Web site; abnormal traffic monitor; application layer based DDoS attack; distributed denial of service; flash crowd mimic; security module; Calibration; Computer crime; Filtering theory; IP networks; Information filters; Kalman filters; Application-layer DDoS; DDos; Information Theory; Kalman filter;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network and System Security (NSS), 2010 4th International Conference on
Conference_Location :
Melbourne, VIC
Print_ISBN :
978-1-4244-8484-3
Electronic_ISBN :
978-0-7695-4159-4
Type :
conf
DOI :
10.1109/NSS.2010.69
Filename :
5635484
Link To Document :
بازگشت