Proceedings of the 10th ACM Conference on Computer and Communications Security 2003
DOI: 10.1145/948109.948114
|View full text |Cite
|
Sign up to set email alerts
|

Using graphic turing tests to counter automated DDoS attacks against web servers

Abstract: We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits two key characteristics of the web environment: its design around a human-centric interface, and the extensibility inherent in many browsers through downloadable "applets." We guarantee access to a web server for a large number of previously unknown users, without requiring preexisting trust relationships between users and the system.O… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
78
0

Year Published

2005
2005
2017
2017

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 121 publications
(78 citation statements)
references
References 27 publications
(25 reference statements)
0
78
0
Order By: Relevance
“…Thus, Reverse Turing tests have also been suggested to counter DDoS attacks against webservers [11]. The option of using our detection mechanisms to detect suspicious traffic and then try to actively distinguish between human-generated and computergenerated traffic may be more widely useful, since it does not depend on the statistical properties of the flash-crowd, which an attacker can easily mimic.…”
Section: Discussion On Flash-crowdsmentioning
confidence: 99%
“…Thus, Reverse Turing tests have also been suggested to counter DDoS attacks against webservers [11]. The option of using our detection mechanisms to detect suspicious traffic and then try to actively distinguish between human-generated and computergenerated traffic may be more widely useful, since it does not depend on the statistical properties of the flash-crowd, which an attacker can easily mimic.…”
Section: Discussion On Flash-crowdsmentioning
confidence: 99%
“…MULTOPS [12] is a heuristic and a data-structure that network devices (e.g., routers) at the source subnet can use to detect and filter DDoS flooding attacks. A Graphic Turing test [13] could be a suitable approach to defend DoS attacks for a high traffic web server to distinguish between human interaction and automated attack zombies. In another study, cloud security was ensured by increasing virtual machine security [14].…”
Section: Related Workmentioning
confidence: 99%
“…[4,12] for a taxonomy of these DoS attacks). Several authors have explored the use of DHTs to prevent DoS attacks from outsiders (e.g., [8,6,13]). Secure Overlay Services (SOS) [8], for example, uses a proxy approach based on the Chord network to protect applications against flooding DoS attacks.…”
Section: Related Workmentioning
confidence: 99%