题名 | CALD: Surviving various application-layer DDoS attacks that mimic flash crowd |
作者 | |
发表日期 | 2010 |
会议名称 | 4th International Conference on Network and System Security, NSS 2010 |
会议录名称 | Proceedings - 2010 4th International Conference on Network and System Security, NSS 2010
![]() |
ISBN | 978-1-4244-8484-3 |
页码 | 247-254 |
会议日期 | 1-3 Sept. 2010 |
会议地点 | Melbourne, VIC, Australia |
摘要 | Distributed denial of service (DDoS) attack is a continuous critical threat to the Internet. Derived from the low layers, new application-layer-based DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. The case may be more serious when suchattacks mimic or occur during the flash crowd event of a popular Website. In this paper, we present the design and implementation of CALD, an architectural extension to protect Web servers against various DDoS attacks that masquerade as flash crowds. CALD provides real-time detection using mess tests but is different from other systems that use resembling methods. First, CALD uses a front-end sensor to monitor thetraffic that may contain various DDoS attacks or flash crowds. Intense pulse in the traffic means possible existence of anomalies because this is the basic property of DDoS attacks and flash crowds. Once abnormal traffic is identified, the sensor sends ATTENTION signal to activate the attack detection module. Second, CALD dynamically records the average frequency of each source IP and check the total mess extent. Theoretically, the mess extent of DDoS attacks is larger than the one of flash crowds. Thus, with some parameters from the attack detection module, the filter is capable of letting the legitimate requests through but the attack traffic stopped. Third, CALD may divide the security modules away from the Web servers. As a result, it keeps maximum performance on the kernel web services, regardless of the harassment from DDoS. In the experiments, the records from www.sina.com and www.taobao.com have proved the value of CALD. © 2010 IEEE. |
关键词 | Application-layer DDoS Information theory Kalman filter |
DOI | 10.1109/NSS.2010.69 |
URL | 查看来源 |
语种 | 英语English |
引用统计 | |
文献类型 | 会议论文 |
条目标识符 | https://repository.uic.edu.cn/handle/39GCC9TT/4521 |
专题 | 个人在本单位外知识产出 |
作者单位 | 1.Central South University, Changsha, Hunan 410083, China 2.Deakin University, Melbourne 3125, Australia 3.Chongqing University, Chongqing, Sichuan 40044, China |
推荐引用方式 GB/T 7714 | Wen, Sheng,Jia, Weijia,Zhou, Weiet al. CALD: Surviving various application-layer DDoS attacks that mimic flash crowd[C], 2010: 247-254. |
条目包含的文件 | 条目无相关文件。 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论