Author :
Ranjan, Supranamaya ; Swaminathan, Ram ; Uysal, Mustafa ; Nucci, Antonio ; Knightly, Edward
Abstract :
Countering distributed denial of service (DDoS) attacks is becoming ever more challenging with the vast resources and techniques increasingly available to attackers. In this paper, we consider sophisticated attacks that are protocol-compliant, non-intrusive, and utilize legitimate application-layer requests to overwhelm system resources. We characterize application-layer resource attacks as either request flooding, asymmetric, or repeated one-shot, on the basis of the application workload parameters that they exploit. To protect servers from these attacks, we propose a counter-mechanism namely DDoS Shield that consists of a suspicion assignment mechanism and a DDoS-resilient scheduler. In contrast to prior work, our suspicion mechanism assigns a continuous value as opposed to a binary measure to each client session, and the scheduler utilizes these values to determine if and when to schedule a session´s requests. Using testbed experiments on a web application, we demonstrate the potency of these resource attacks and evaluate the efficacy of our counter-mechanism. For instance, we mount an asymmetric attack which overwhelms the server resources, increasing the response time of legitimate clients from 0.3 seconds to 40 seconds. Under the same attack scenario, DDoS Shield improves the victims´ performance to 1.5 seconds.
Keywords :
authorisation; security of data; DDoS-Shield; DDoS-resilient scheduling; application layer attacks; application workload parameters; application-layer requests; distributed denial of service; Anomaly detection; application layer attacks; denial-of-service attacks; information entropy; site security monitoring;