A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds

被引:1
|
作者
Kung, Yi-Hsuan [1 ]
Lee, Taeho [2 ]
Tseng, Po-Ning [1 ]
Hsiao, Hsu-Chun [1 ]
Kim, Tiffany Hyun-Jin [3 ]
Lee, Soo Bum [4 ]
Lin, Yue-Hsun [5 ]
Perrig, Adrian [2 ]
机构
[1] Natl Taiwan Univ, Taipei, Taiwan
[2] ETH, Zurich, Switzerland
[3] HRL Labs, Malibu, CA USA
[4] Qualcomm, San Diego, CA USA
[5] Samsung Res Amer, Mountain View, CA USA
关键词
D O I
10.1109/ICNP.2015.11
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the growing incidents of flash crowds and sophisticated DDoS attacks mimicking benign traffic, it becomes challenging to protect Internet-based services solely by differentiating attack traffic from legitimate traffic. While fair-sharing schemes are commonly suggested as a defense when differentiation is difficult, they alone may suffer from highly variable or even unbounded waiting times. We propose RainCheck Filter (RCF), a lightweight primitive that guarantees bounded waiting time for clients despite server flooding without keeping per-client state on the server. RCF achieves strong waiting time guarantees by prioritizing clients based on how long the clients have waited-as if the server maintained a queue in which the clients lined up waiting for service. To avoid keeping state for every incoming client request, the server sends to the client a raincheck, a timestamped cryptographic token that not only informs the client to retry later but also serves as a proof of the client's priority level within the virtual queue. We prove that every client complying with RCF can access the server in bounded time, even under a flash crowd incident or a DDoS attack. Our large-scale simulations confirm that RCF provides a small and predictable maximum waiting time while existing schemes cannot. To demonstrate its deployability, we implement RCF as a Python module such that web developers can protect a critical server resource by adding only three lines of code.
引用
收藏
页码:212 / 223
页数:12
相关论文
共 50 条
  • [1] AN EFFECTIVE METHOD FOR DIFFERENTIATING BETWEEN DDOS ATTACKS AND FLASH CROWDS
    Yan, Ruoyu
    Wang, Yingfeng
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2024, 20 (01): : 31 - 46
  • [2] Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics
    Li, Ke
    Zhou, Wanlei
    Li, Ping
    Hai, Jing
    Liu, Jianwen
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 9 - 17
  • [3] BEHAVIOR-BASED CLUSTERING FOR DISCRIMINATION BETWEEN FLASH CROWDS AND DDoS ATTACKS
    Heo, Young Jun
    Oh, Jintae
    Jang, Jongsoo
    [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 140 - 143
  • [4] An information divergence based approach to detect flooding DDoS attacks and Flash Crowds
    Kaur, Gursharanjeet
    Behal, Sunny
    Shifali
    [J]. PROCEEDINGS OF THE 2017 3RD INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2017, : 251 - 258
  • [5] Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient
    Yu, Shui
    Zhou, Wanlei
    Jia, Weijia
    Guo, Song
    Xiang, Yong
    Tang, Feilong
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (06) : 1073 - 1080
  • [6] Discriminating flash crowds from DDoS attacks using efficient thresholding algorithm
    David, Jisa
    Thomas, Ciza
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2021, 152 : 79 - 87
  • [7] Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds
    Kandula, S
    Katabi, D
    Jacob, M
    Berger, A
    [J]. USENIX Association Proceedings of the 2nd Symposium on Networked Systems Design & Implementation (NSDI '05), 2005, : 287 - 300
  • [8] Detection of spoofed and non-spoofed DDoS attacks and discriminating them from flash crowds
    Gera J.
    Battula B.P.
    [J]. Eurasip Journal on Information Security, 2018, 2018 (01)
  • [9] MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks
    Jeyanthi, N.
    Sriman, N. Ch.
    Iyengar, Narayana
    [J]. CYBERNETICS AND INFORMATION TECHNOLOGIES, 2011, 11 (04) : 41 - 52
  • [10] Detection and identification of Neptune attacks and flash crowds
    Le, The Quyen
    Zhanikeev, Marat
    Tanaka, Yoshiaki
    [J]. MANAGING NEXT GENERATION NETWORKS AND SERVICES, PROCEEDINGS, 2007, 4773 : 571 - +