Defense techniques for low-rate DoS attacks against application servers

نویسندگان

  • Gabriel Maciá-Fernández
  • Rafael Rodríguez-Gómez
  • Jesús E. Díaz-Verdejo
چکیده

1389-1286/$ see front matter 2010 Elsevier B.V doi:10.1016/j.comnet.2010.05.002 * Corresponding author. Tel.: +34 95824100 958240831. E-mail addresses: [email protected] (G. Maciá-Fe correo.ugr.es (R.A. Rodríguez-Gómez), [email protected] ( Low-rate denial of service (DoS) attacks have recently emerged as new strategies for denying networking services. Such attacks are capable of discovering vulnerabilities in protocols or applications behavior to carry out a DoS with low-rate traffic. In this paper, we focus on a specific attack: the low-rate DoS attack against application servers, and address the task of finding an effective defense against this attack. Different approaches are explored and four alternatives to defeat these attacks are suggested. The techniques proposed are based on modifying the way in which an application server accepts incoming requests. They focus on protective measures aimed at (i) preventing an attacker from capturing all the positions in the incoming queues of applications, and (ii) randomizing the server operation to eliminate possible vulnerabilities due to predictable behaviors. We extensively describe the suggested techniques, discussing the benefits and drawbacks for each under two criteria: the attack efficiency reduction obtained, and the impact on the normal operation of the server. We evaluate the proposed solutions in a both a simulated and a real environment, and provide guidelines for their implementation in a production system. 2010 Elsevier B.V. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Advanced Random Time Queue Blocking for Effective Protection of Application Servers Against Low-Rate DoS Attacks

Low-rate traffic denial-of-service (DoS) attacks are a strategy to deny services of a network by detecting the vulnerabilities in the application behaviors. The lowrate DoS attack against the application servers is considered in this paper with the motive to develop an efficient defense technique against the low-rate DoS attack. Among different defense techniques, the Improved Random Time Queue...

متن کامل

Evaluation of a low-rate DoS attack against application servers

In the network security field there is a need to identify new movements and trends that attackers might adopt, in order to anticipate their attempts with defense and mitigation techniques. The present study explores new approaches that attackers could use in order to make denial of service attacks against application servers. We show that it is possible to launch such attacks by using low-rate ...

متن کامل

LoRDAS: A Low-Rate DoS Attack against Application Servers

In a communication network, there always exist some specific servers that should be considered a critical infrastructure to be protected, specially due to the nature of the services that they provide. In this paper, a low-rate denial of service attack against application servers is presented. The attack gets advantage of known timing mechanisms in the server behaviour to wisely strike ON/OFF at...

متن کامل

Mitigating Denial of Service Attacks in Computer Networks

Monograph Article dissertation (summary + original articles) Department Laboratory Field of research Opponents Supervisor Abstract Keywords Network security, denial of service attacks, attack mechanisms, defense mechanisms. X This dissertation studies how to defend against denial of service (DoS) attacks in computer networks. As it is not possible to prevent these attacks, one must concentrate ...

متن کامل

Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper)

A low-rate DoS attack to iterative servers has recently appeared as a new approach for defeating services using rates of traffic that could be adjusted to bypass security detection mechanisms. Although the fundamentals and effectiveness of these kind of attacks are known, it is not clear how to design the attack to achieve specific constraints based on the used rate and the efficiency in denial...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Networks

دوره 54  شماره 

صفحات  -

تاریخ انتشار 2010