How to Build a Dam: Fighting Application-Level DoS Attacks

نویسندگان

  • Gal Badishi
  • Amir Herzberg
  • Idit Keidar
چکیده

The Internet has become a fertile ground for hostile activity. One of the simplest yet most effective attacks that can be launched over the network is a denial of service (DoS) attack. The most trivial form of a DoS attack floods the target with packets, causing congestion and consuming all available network resources. In order to employ massive attack power, the attacker usually launches a distributed denial of service (DDoS) attack, in which several subordinate hosts flood the target in concert. Traditionally, DoS attacks were performed at the network level. As a result, various network-level solutions have emerged. One type of readily available and cheap solution uses an existing firewall or router to perform ratelimiting of traffic and filtering of packets according to header fields like address and port number. Since most reasonable networks already contain the necessary hardware regardless of DoS attacks, this solution is very appealing. However, these solutions have limited effectiveness. Spoofing of headers that match the filtering criteria can be easily performed, and although rate-limiting stops networks from being overwhelmed, it indiscriminately discards messages. Another type of solution uses expensive devices proposed by commercial companies. These solutions rely on additional, costly hardware and software that perform complex computations to track incoming packets and decide on an action to take. Indeed, such solutions can identify and isolate the DoS attack much better than the simple solutions presented above. However, complex and expensive systems are not suitable for most organizations. As network-level DoS defenses are becoming more readily available, we can identify a shift of trends in the attackers’ strategy. Since applications tend to perform much more computations per packet than a network-level mechanism does, less traffic is needed to cause the application to exhaust all CPU resources and fail to handle valid requests. Hence, an easy application-level DoS attack is in effect. Another testament for this important problem was given in 1999 by The Committee on Information Systems and Trustworthiness. The committee declared that defending

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modular System for Mitigating Flood Attacks

Denial-of-Service (DoS) flooding attacks have become a serious threat to the reliability of the Internet. Web servers face all kinds of users; some of them engage malicious activities to degrade or completely block network services, such as flooding attacks. As a result, lots of resource and bandwidth on web sites might be wasted. While many approaches exist to filter network-level attacks, the...

متن کامل

Protecting Web Services from DoS Attacks by SOAP Message Validation

Though Web Services become more and more popular, not only inside closed intranets but also for inter-enterprise communications, few efforts have been made so far to secure a Web Service’s availability. Existing security standards like e.g. WS-Security only address message integrity and confidentiality, and user authentication and authorization. In this article we present a system for protectin...

متن کامل

Measuring Impact of DoS Attacks

Denial of service attacks are an increasing threat to the Internet’s availability and reliability. To evaluate a variety of defenses proposed against this threat we must be able to precisely measure impact of an ongoing attack on a network. The effectiveness of a defense can then be calculated with regard to how quickly and how completely it eliminates this DoS impact. We propose a DoS impact m...

متن کامل

A Middleware System for Protecting Against Application Level Denial of Service Attacks

Recently, we have seen increasing numbers of denial of service (DoS) attacks against online services and web applications either for extortion reasons, or for impairing and even disabling the competition. These DoS attacks have increasingly targeted the application level. Application level DoS attacks emulate the same request syntax and network level traffic characteristics as those of legitima...

متن کامل

Analysis of Cybercrime and Cyber Attacks during the COVID-19 Pandemic

The COVID-19 pandemic was a remarkable and unprecedented event that changed the lives of billions of citizens around the world and resulted in what is known as a new term in terms of social norms and lifestyles. In addition to the tremendous impact on society and business in general, the epidemic created a unique set of cybercrime circumstances that also affected society and business. Increased...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005