2010 Fourth International Conference on Network and System Security 2010
DOI: 10.1109/nss.2010.69
|View full text |Cite
|
Sign up to set email alerts
|

CALD: Surviving Various Application-Layer DDoS Attacks That Mimic Flash Crowd

Abstract: Distributed denial of service (DDoS) attack is a continuous critical threat to the Internet. Derived from the low layers, new application-layer-based DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. The case may be more serious when such attacks mimic or occur during the flash crowd event of a popular Website. In this paper, we present the design and implementation of CALD, an architectural extension to protect Web servers against various DDoS attacks that ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
33
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 34 publications
(33 citation statements)
references
References 15 publications
0
33
0
Order By: Relevance
“…Sheng Wen, et al [6] proposed an architecture extension called CLAD to protect web server against attacks that mimics flash crowd. It uses a front end sensor to monitor incoming traffic.…”
Section: Related Workmentioning
confidence: 99%
“…Sheng Wen, et al [6] proposed an architecture extension called CLAD to protect web server against attacks that mimics flash crowd. It uses a front end sensor to monitor incoming traffic.…”
Section: Related Workmentioning
confidence: 99%
“…Due to the subtle nature of a FRC attack, previous application-layer DDoS solutions that focus on high request intensities will not be suitable for FRC detection [120]. Instead, initial FRC detection approaches focus on behavioral metrics derived from web logs that seek to capture the aggregate web page request choices of a websites client base.…”
Section: Detectionmentioning
confidence: 99%
“…If the attack intensity increases above J2, the aggregate resource consumption will reach a point when the QoS starts to significantly degrade as the increase resource utilization results in an increase in system response latency. It is at this point detection like, as stated in [56,58,120], current application-layer DDoS detection and mitigation schemes will be activated. The transition point between the inability and ability to detect malicious resource consumption is denoted as J2 on Figure 3.2.…”
Section: Attack Descriptionmentioning
confidence: 99%
See 2 more Smart Citations