Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3274694.3274727acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article
Public Access

DeDoS: Defusing DoS with Dispersion Oriented Software

Published: 03 December 2018 Publication History

Abstract

This paper presents DeDoS, a novel platform for mitigating asymmetric DoS attacks. These attacks are particularly challenging since even attackers with limited resources can exhaust the resources of well-provisioned servers. DeDoS offers a framework to deploy code in a highly modular fashion. If part of the application stack is experiencing a DoS attack, DeDoS can massively replicate only the affected component, potentially across many machines. This allows scaling of the impacted resource separately from the rest of the application stack, so that resources can be precisely added where needed to combat the attack. Our evaluation results show that DeDoS incurs reasonable overheads in normal operations, and that it significantly outperforms standard replication techniques when defending against a range of asymmetric attacks.

References

[1]
2011. SSL Renegotiation DoS. (2011). https://www.ietf.org/mail-archive/web/tls/current/msg07553.html.
[2]
2017. DeDOS demonstration at SIGCOMM 2017. https://www.youtube.com/watch?v=KX4EPnUzDqk. https://www.youtube.com/watch?v=KX4EPnUzDqk
[3]
2017. Regular expression Denial of Service - ReDoS. (2017). https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS.
[4]
2017. Tsung. http://tsung.erlang-projects.org/. http://tsung.erlang-projects.org/
[5]
2018. AWS Lambda. https://aws.amazon.com/lambda. https://aws.amazon.com/lambda
[6]
2018. Azure functions. https://functions.azure.com. https://functions.azure.com
[7]
2018. Common Vulnerabilities and Exposures (see CVE-2015-8386). (2018). http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386.
[8]
2018. DeDOS on GitHub. https://github.com/dedos-project/DeDOS. https://github.com/dedos-project/DeDOS
[9]
2018. Google Cloud Functions. https://cloud.google.com/functions.
[10]
2018. OpenWhisk. https://developer.ibm.com/openwhisk.
[11]
Luiz André Barroso, Jimmy Clidaras, and Urs Hölzle. 2013. The datacenter as a computer: An introduction to the design of warehouse-scale machines. Synthesis lectures on computer architecture 8, 3 (2013), 1--154.
[12]
Ang Chen, Akshay Sriraman, Tavish Vaidya, Yuankai Zhang, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, and Wenchao Zhou. 2016. Dispersing Asymmetric DDoS Attacks with SplitStack. In Proc. HotNets.
[13]
Henri Maxime Demoulin, Tavish Vaidya, Isaac Pedisich, Nik Sultana, Bowen Wang, Jingyu Qian, Yuankai Zhang, Ang Chen, Andreas Haeberlen, Boon Thau Loo, et al. 2017. A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data Centers. In Proceedings of the SIGCOMM Posters and Demos. ACM.
[14]
F5. 2018. SSL Acceleration. https://f5.com/glossary/ssl-acceleration.
[15]
Seyed K. Fayaz, Yoshiaki Tobioka, Vyas Sekar, and Michael Bailey. 2015. Bohatei: Flexible and Elastic DDoS Defense. In Proc. USENIX Security.
[16]
Bryan Ford, Godmar Back, Greg Benson, Jay Lepreau, Albert Lin, and Olin Shivers. 1997. The Flux OSKit: A Substrate for Kernel and Language Research. In Proc. SOSP.
[17]
Sadjad Fouladi, Riad S Wahby, Brennan Shacklett, Karthikeyan Balasubramaniam, William Zeng, Rahul Bhalerao, Anirudh Sivaraman, George Porter, and Keith Winstein. 2017. Encoding, Fast and Slow: Low-Latency Video Processing Using Thousands of Tiny Threads. In NSDI. 363--376.
[18]
Sean Gallagher. 2016. Double-dip Internet-of-Things Botnet Attack Felt Across the Internet. https://arstechnica.com/security/2016/10/double-dip-internet-of-things-botnet-attack-felt-across-the-internet/.
[19]
Alain Gefflaut, Trent Jaeger, Yoonho Park, Jochen Liedtke, Kevin J. Elphinstone, Volkmar Uhlig, Jonathon E. Tidswell, Luke Deller, and Lars Reuther. 2000. The SawMill Multiserver Approach. In Proc 9th ACM SIGOPS European Workshop. 109--114.
[20]
Gkbrk. 2018. SlowLoris attack tool. https://github.com/gkbrk/slowloris.
[21]
Saikat Guha, Paul Francis, and Nina Taft. 2008. ShutUp: End-to-End Containment of Unwanted Traffic. Technical Report. Cornell University.
[22]
Quan Jia, Huangxin Wang, Dan Fleck, Fei Li, Angelos Stavrou, and Walter Powell. 2014. Catch Me if You Can: A Cloud-Enabled DDoS Defense. In Proc. DSN.
[23]
Cheng Jin, Haining Wang, and Kang G. Shin. 2003. Hop-count filtering: an effective defense against spoofed DDoS traffic. In Proc. CCS.
[24]
Joyent Inc. and other Node contributors. {n. d.}. NodeJS HTTP Parser. https: //github.com/nodejs/http-parser.
[25]
Christine Kern. 2016. Increased Use Of Multi-Vector DDoS Attacks Targeting Companies. (2016). http://www.bsminfo.com/doc/increased-use-of-multi-vector-ddos-attacks-targeting-companies-0001.
[26]
Eddie Kohler, Robert Morris, Benjie Chen, John Jannotti, and M. Frans Kaashoek. 2000. The Click Modular Router. ACM Trans. Comput. Syst. 18, 3 (Aug. 2000), 263--297.
[27]
Soom Bum Lee, Min Suk Kang, and Virgil D. Gligor. 2013. CoDef: Collaborative Defense Against Large-Scale Link-Flooding Attacks. In Proc. CoNEXT.
[28]
Qi Liao, David A. Cieslak, Aaron D. Striegel, and Nitesh V. Chawla. 2008. Using selective, short-term memory to improve resilience against DDoS exhaustion attacks. Security and Communication Networks 1, 4 (2008), 287--299.
[29]
Boon Thau Loo, Tyson Condie, Minos Garofalakis, David E. Gay, Joseph M. Hellerstein, Petros Maniatis, Raghu Ramakrishnan, Timothy Roscoe, and Ion Stoica. 2009. Declarative networking. Comm. ACM 52, 11 (Nov. 2009), 87--95.
[30]
Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, and Scott Shenker. 2002. Controlling High Bandwidth Aggregates in the Network. In Proc. CCR.
[31]
Sam Newman. 2015. Building microservices: designing fine-grained systems." O'Reilly Media, Inc.".
[32]
Parveen Patel, Deepak Bansal, Lihua Yuan, Ashwin Murthy, Albert Green-berg, David A. Maltz, Randy Kern, Hemant Kumar, Marios Zikos, Hongyu Wu, Changhoon Kim, and Naveen Karri. 2013. Ananta: Cloud Scale Load Balancing. In Proc. SIGCOMM.
[33]
John Pescatore. 2014. DDoS Attacks Advancing and Enduring: A SANS Survey. Technical Report. SANS Institute.
[34]
picoTCP 2018. picoTCP. http://www.picotcp.com/.
[35]
Christian Rossow. 2014. Amplification Hell: Revisiting Network Protocols for DDoS Abuse. In Proc. NDSS.
[36]
Fabrice J. Ryba, Matthew Orlinski, Matthias Wählisch, Christian Rossow, and Thomas C. Schmidt. 2015. Amplification and DRDoS Attack Defense -- A Survey and New Perspectives. CoRR abs/1505.07892 (2015). http://arxiv.org/abs/1505.07892
[37]
David Senecal. 2013. Slow DoS on the Rise. (2013). https://blogs.akamai.com/2013/09/slow-dos-on-the-rise.html.
[38]
Willy Tarreau. 2018. HA-Proxy load balancer. http://haproxy.com/.
[39]
Matt Welsh, David Culler, and Eric Brewer. 2001. SEDA: An Architecture for Well-conditioned, Scalable Internet Services. In Proc. SOSP.
[40]
Jianxin Yan, Stephen Early, and Ross Anderson. 2000. The XenoService -- A Distributed Defeat for Distributed Denial of Service. In Proc. ISW.
[41]
Saman Taghavi Zargar, James Joshi, and David Tipper. 2013. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks. IEEE Communications Surveys & Tutorials 15, 4 (2013), 2046--2069.

Cited By

View all
  • (2023)Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web ApplicationsProceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3607199.3607238(744-758)Online publication date: 16-Oct-2023
  • (2022)StargazeProceedings of the 4th Workshop on CPS & IoT Security and Privacy10.1145/3560826.3563382(47-53)Online publication date: 7-Nov-2022
  • (2021)A nationwide census on wifi security threatsProceedings of the 27th Annual International Conference on Mobile Computing and Networking10.1145/3447993.3448620(242-255)Online publication date: 25-Oct-2021
  • Show More Cited By

Index Terms

  1. DeDoS: Defusing DoS with Dispersion Oriented Software

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ACSAC '18: Proceedings of the 34th Annual Computer Security Applications Conference
    December 2018
    766 pages
    ISBN:9781450365697
    DOI:10.1145/3274694
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    In-Cooperation

    • ACSA: Applied Computing Security Assoc

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 December 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Denial-of-Service
    2. Distributed Systems

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    Conference

    ACSAC '18

    Acceptance Rates

    Overall Acceptance Rate 104 of 497 submissions, 21%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)84
    • Downloads (Last 6 weeks)15
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web ApplicationsProceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3607199.3607238(744-758)Online publication date: 16-Oct-2023
    • (2022)StargazeProceedings of the 4th Workshop on CPS & IoT Security and Privacy10.1145/3560826.3563382(47-53)Online publication date: 7-Nov-2022
    • (2021)A nationwide census on wifi security threatsProceedings of the 27th Annual International Conference on Mobile Computing and Networking10.1145/3447993.3448620(242-255)Online publication date: 25-Oct-2021
    • (2021)Revealer: Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities2021 IEEE Symposium on Security and Privacy (SP)10.1109/SP40001.2021.00062(1468-1484)Online publication date: May-2021
    • (2019)Detecting asymmetric application-layer denial-of-service attacks in-flight with finelameProceedings of the 2019 USENIX Conference on Usenix Annual Technical Conference10.5555/3358807.3358866(693-707)Online publication date: 10-Jul-2019

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media