Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Mitigating application-level denial of service attacks on Web servers: a client-transparent approach
Srivatsa M., Iyengar A., Yin J., Liu L. ACM Transactions on the Web2 (3):1-49,2008.Type:Article
Date Reviewed: Sep 19 2008

When the response from Google or Yahoo! is slow, you may think, “What a busy day it is!” But the actual truth may be that these Web sites are being attacked using the denial of service (DoS) tactic. A DoS attack is an attempt to make a service unavailable to its intended users. In the real world, a terrorist may attack a place to make it unavailable. In the networked world, the means to carry out and the motives for DoS attacks vary. However, the goal is always the same: to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.

This paper proposes an architecture that includes admission-control and congestion-control mechanisms to thwart DoS attacks. Extensive experiments show that this approach has low performance overhead and is resilient to DoS attacks.

Preventing DoS attacks is difficult, if not impossible. First of all, it is hard to differentiate between real user traffic and DoS attack traffic. Second, the frontier machine, meant to defend from the DoS attack, is itself under attack; there is nothing to protect it. In this paper, the doorkeeper machine uses a challenge-response strategy to determine if a client is legitimate. To prevent the challenge-response server from being drowned by DoS attack packets, the paper ensures that calculating the response is several orders of magnitude costlier than the challenge. However, it still does not solve the distributed DoS (DDoS) problem. If the response is 1,000 times more difficult than the challenge, perhaps 1,000,000 zombie clients will swamp the challenge server.

This paper is quite long (49 pages); therefore, you know it’s meticulous. As a result, the reader will learn a lot about DoS.

Reviewer:  R. S. Chang Review #: CR136080 (0907-0659)
Bookmark and Share
  Featured Reviewer  
 
Distributed Systems (C.2.4 )
 
 
Security and Protection (C.2.0 ... )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Distributed Systems": Date
The evolution of a distributed processing network
Franz L., Sen A., Rakes T. Information and Management 7(5): 263-272, 1984. Type: Article
Jul 1 1985
A geographically distributed multi-microprocessor system
Angioletti W., D’Hondt T., Tiberghien J.  Concurrent languages in distributed systems: hardware supported implementation (, Bristol, UK,871985. Type: Proceedings
Oct 1 1985
A fault tolerant LAN with integrated storage, as part of a distributed computing system
Boogaard H., Bruins T., Vree W., Reijns G.  Concurrent languages in distributed systems: hardware supported implementation (, Bristol, UK,1001985. Type: Proceedings
Aug 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy