CDN-on-Demand: An affordable DDoS Defense via Untrusted Clouds

نویسندگان

  • Yossi Gilad
  • Amir Herzberg
  • Michael Sudkovitch
  • Michael Goberman
چکیده

We present CDN-on-Demand, a software-based defense that administrators of small to medium websites install to resist powerful DDoS attacks, with a fraction of the cost of comparable commercial CDN services. Upon excessive load, CDNon-Demand serves clients from a scalable set of proxies that it automatically deploys on multiple IaaS cloud providers. CDN-onDemand can use less expensive and less trusted clouds to minimize costs. This is facilitated by the clientless secure-objects, which is a new mechanism we present. This mechanism avoids trusting the hosts with private keys or user-data, yet does not require installing new client programs. CDN-on-Demand also introduces the origin-connectivity mechanism, which ensures that essential communication with the content-origin is possible, even in case of severe DoS attacks. A critical feature of CDN-on-Demand is in facilitating easy deployment. We introduce the origin-gateway module, which deploys CDN-on-Demand automatically and transparently, i.e., without introducing changes to web-server configuration or website content. We implement CDN-on-Demand and evaluate each component separately as well as the complete system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Shuffling Based Mechanism for DDoS Prevention on Cloud Environment

Cloud Computing has evolved as a new paradigm in which users can use on-demand services, according to their needs. However, security concerns are primary obstacles to a wider adoption of clouds. Newly born concepts that clouds introduced, such as multitenancy, resource sharing and outsourcing, create new challenges for the security research. DDoS (Distributed Denial of service) attack is the bi...

متن کامل

Multi-domain DDoS Mitigation Based on Blockchains

The exponential increase of the traffic volume makes Distributed Denial-of-Service (DDoS) attacks a top security threat to service providers. Existing DDoS defense mechanisms lack resources and flexibility to cope with attacks by themselves, and by utilizing other’s companies resources, the burden of the mitigation can be shared. Technologies as blockchain and smart contracts allow distributing...

متن کامل

Capturing DDoS Attack Dynamics Behind the Scenes

Despite continuous defense efforts, DDoS attacks are still very prevalent on the Internet. In such arms races, attackers are becoming more agile and their strategies are more sophisticated to escape from detection. Effective defenses demand in-depth understanding of such strategies. In this paper, we set to investigate the DDoS landscape from the perspective of the attackers. We focus on the dy...

متن کامل

Anomaly Based DDoS Attack Detection Mechanism using SDN in Cloud computing

: Cloud computing has recently came into view as a new paradigm for hosting and delivering services over the Internet. Cloud computing is captivating to business owners as it eliminates the requirement for users to plan ahead for providing, and allows enterprises to start from the small and increase resources only when there is a rise in service demand. Meanwhile, Software Defined Networking (S...

متن کامل

Study of Recent DDoS Attacks and Defense Evaluation Approaches

Distributed Denial of Service (DDoS) attacks is virulent, relatively new type of attacks on the availability of Internet services and resources. DDoS attackers infiltrate large number of computers by exploiting software vulnerabilities, to set up DDoS attack networks. DDoS attacks pose an immense threat to the Internet, therefore some defense systems are required to defend these attacks. In thi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016