DDoS-shield: DDoS-resilient scheduling to counter application layer attacks

  • Authors:
  • Supranamaya Ranjan;Ram Swaminathan;Mustafa Uysal;Antonio Nucci;Edward Knightly

  • Affiliations:
  • Narus Inc., Mountain View, CA and Department of Electrical and Computer Engineering, Rice University, Houston, TX;HP Laboratories, Palo Alto, CA;HP Laboratories, Palo Alto, CA;Narus Inc., Mountain View, CA;Department of Electrical and Computer Engineering, Rice University, Houston, TX

  • Venue:
  • IEEE/ACM Transactions on Networking (TON)
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Countering distributed denial of service (DDoS) attacks is becoming ever more challenging with the vast resources and techniques increasingly available to attackers. In this paper, we consider sophisticated attacks that are protocol-compliant, non-intrusive, and utilize legitimate application-layer requests to overwhelm system resources. We characterize application-layer resource attacks as either request flooding, asymmetric, or repeated one-shot, on the basis of the application workload parameters that they exploit. To protect servers from these attacks, we propose a counter-mechanism namely DDoS Shield that consists of a suspicion assignment mechanism and a DDoS-resilient scheduler. In contrast to prior work, our suspicion mechanism assigns a continuous value as opposed to a binary measure to each client session, and the scheduler utilizes these values to determine if and when to schedule a session's requests. Using testbed experiments on a web application, we demonstrate the potency of these resource attacks and evaluate the efficacy of our counter-mechanism. For instance, we mount an asymmetric attack which overwhelms the server resources, increasing the response time of legitimate clients from 0.3 seconds to 40 seconds. Under the same attack scenario, DDoS Shield improves the victims' performance to 1.5 seconds.