Towards Mitigation of Low and Slow Application DDoS Attacks

被引:36
|
作者
Shtern, Mark [1 ]
Sandel, Roni [1 ]
Litoiu, Marin [1 ]
Bachalo, Chris [2 ]
Theodorou, Vasileios [3 ]
机构
[1] York Univ, Toronto, ON M3J 2R7, Canada
[2] Juniper Networks, Ottawa, ON, Canada
[3] Univ Politecn Cataluna, Barcelona, Spain
关键词
Software Defined Network; Low and Slow Distributed Denial of Service (LSDDoS); Application Layer; Cloud;
D O I
10.1109/IC2E.2014.38
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service attacks are a growing threat to organizations and, as defense mechanisms are becoming more advanced, hackers are aiming at the application layer. For example, application layer Low and Slow Distributed Denial of Service attacks are becoming a serious issue because, due to low resource consumption, they are hard to detect. In this position paper, we propose a reference architecture that mitigates the Low and Slow Distributed Denial of Service attacks by utilizing Software Defined Infrastructure capabilities. We also propose two concrete architectures based on the reference architecture: a Performance Model-Based and Off-The-Shelf Components based architecture, respectively. We introduce the Shark Tank concept, a cluster under detailed monitoring that has full application capabilities and where suspicious requests are redirected for further filtering.
引用
收藏
页码:604 / 609
页数:6
相关论文
共 50 条
  • [31] Towards securing cloud computing from DDOS attacks
    Ahmed I.
    Ahmed S.
    Nawaz A.
    Jan S.
    Najam Z.
    Saadat M.
    Khan R.A.
    Zaman K.
    1600, Science and Information Organization (11): : 615 - 622
  • [32] A Selective Defense for Application Layer DDoS Attacks
    Dantas, Yuri G.
    Nigam, Vivek
    Fonseca, Iguatemi E.
    2014 IEEE JOINT INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (JISIC), 2014, : 75 - 82
  • [33] Tackling Application-layer DDoS Attacks
    Beitollahi, Hakem
    Deconinck, Geert
    ANT 2012 AND MOBIWIS 2012, 2012, 10 : 432 - 441
  • [34] Statistical Application Fingerprinting for DDoS Attack Mitigation
    Ahmed, Muhammad Ejaz
    Ullah, Saeed
    Kim, Hyoungshick
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (06) : 1471 - 1484
  • [35] Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks
    Somani, Gaurav
    Gaur, Manoj Singh
    Sanghi, Dheeraj
    Conti, Mauro
    Rajarajan, Muttukrishnan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (06) : 959 - 973
  • [36] A Complete Detection and Mitigation Framework to Protect a Network from DDoS Attacks
    Baishya, Ram Charan
    Bhattacharyya, D. K.
    IETE JOURNAL OF RESEARCH, 2022, 68 (01) : 315 - 332
  • [37] SDN-based detection and mitigation of DDoS attacks on smart homes
    Garba, Usman Haruna
    Toosi, Adel N.
    Pasha, Muhammad Fermi
    Khan, Suleman
    COMPUTER COMMUNICATIONS, 2024, 221 : 29 - 41
  • [38] DDoS Attacks in Communication: Analysis and Mitigation of Unreliable Clients in Federated Learning
    Sanon, Sogo Pierre
    Reddy, Rekha
    Lipps, Christoph
    Schotten, Hans Dieter
    2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 986 - 989
  • [39] Timely Detection and Mitigation of Stealthy DDoS Attacks Via IoT Networks
    Doshi, Keval
    Yilmaz, Yasin
    Uludag, Suleyman
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (05) : 2164 - 2176
  • [40] DNS Amplification Based DDoS Attacks in SDN Environment: Detection and Mitigation
    Gupta, Vishal
    Kochar, Amrit
    Saharan, Shail
    Kulshrestha, Rakhee
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 473 - 478