Defending against denial of service attacks in scout

被引:0
|
作者
Spatscheck, O [1 ]
Peterson, LL [1 ]
机构
[1] Univ Arizona, Dept Comp Sci, Tucson, AZ 85721 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We describe a two-dimensional architecture for defending against denial of service attacks. In one dimension, the architecture accounts for all resources consumed by each I/O path in the system; this accounting mechanism is implemented as an extension to the path object in the Scout operating system. In the second dimension, the various modules that define each path can be configured in separate protection domains; we implement hardware enforced protection domains, although other implementations are possible. The resulting system-which we call Escort-is the first example of a system that simultaneously does end-to-end resource accounting (thereby protecting against resource based denial of service attacks where principals can be identified) and supports multiple protection domains (thereby allowing untrusted modules to be isolated from each other). The paper describes the Escort architecture and its implementation in Scout, and reports a collection of experiments that measure the costs and benefits of using Escort to protect a web server from denial of service attacks.
引用
收藏
页码:59 / 72
页数:14
相关论文
共 50 条
  • [1] Defending networks against denial of service attacks
    Gelenbe, E
    Gellman, M
    Loukas, G
    [J]. UNMANNED/UNATTENDED SENSORS AND SENSOR NETWORKS, 2004, 5611 : 233 - 243
  • [2] Defending against denial-of-service attacks with puzzle auctions
    Wang, XF
    Reiter, MK
    [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 78 - 92
  • [3] Defending against Distributed Denial of Service Attacks: Issues and Challenges
    Gupta, B. B.
    Joshi, R. C.
    Misra, Manoj
    [J]. INFORMATION SECURITY JOURNAL, 2009, 18 (05): : 224 - 247
  • [4] Defending network-based services against denial of service attacks
    Kurian, Jinu
    Sarac, Kamil
    Almeroth, Kevin
    [J]. ICCCN 2006: 15TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2006, : 17 - +
  • [5] Defending network-based services against denial of service attacks
    Department of Computer Science, University of Texas at Dallas, Richardson, TX 75080, United States
    [J]. Int. J. Netw. Secur., 2009, 2 (186-200):
  • [6] Defending against distributed denial of service attacks with bating puzzle auction
    Kim, S
    Wee, K
    Hong, M
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 361 - 366
  • [7] Defending against denial of service attacks using secure name resolution.
    Dewan, P
    Dasgupta, P
    Karamcheti, V
    [J]. SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 675 - 681
  • [8] Defending against denial of service attacks using a modified priority queue: Bouncer
    Safko, Gregory
    [J]. Conf Proc IEEE SOUTHEASTCON, (114-119):
  • [9] Defending against denial of service attacks using a modified priority queue: Bouncer
    Safko, Gregory
    [J]. Proceedings of the IEEE SoutheastCon 2006, 2006, : 114 - 119
  • [10] Defending against flooding-based distributed denial-of-service attacks: A tutorial
    Chang, RKC
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) : 42 - 51