2005
DOI: 10.1016/j.comnet.2005.01.005
|View full text |Cite
|
Sign up to set email alerts
|

WebSOS: an overlay-based system for protecting web servers from denial of service attacks

Abstract: We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits two key characteristics of the web environment: its design around a human-centric interface, and the extensibility inherent in many browsers through downloadable "applets." We guarantee access to a web server for a large number of previously unknown users, without requiring pre-existing trust relationships between users and the system,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0
1

Year Published

2007
2007
2020
2020

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(21 citation statements)
references
References 54 publications
(61 reference statements)
0
20
0
1
Order By: Relevance
“…The last class uses overlay networks [18], [35] to defend against DDoS attacks. Only predefined and authorized users are able to enter and use the overlay network.…”
Section: Related Workmentioning
confidence: 99%
“…The last class uses overlay networks [18], [35] to defend against DDoS attacks. Only predefined and authorized users are able to enter and use the overlay network.…”
Section: Related Workmentioning
confidence: 99%
“…Secure Overlay Services (SOS) [8], for example, uses a proxy approach based on the Chord network to protect applications against flooding DoS attacks. WebSOS [21] is an implementation of SOS for web servers that makes use of graphical Turing tests, web proxies and client authentication. Mayday [1] generalizes the SOS architecture and analyzes the implications of choosing different filtering techniques and overlay routing mechanisms.…”
Section: Related Workmentioning
confidence: 99%
“…We do not investigate how to ensure fees are paid, though many others have done so [7,8,41,42]). We do note that doing so is an easier task than requiring a trusted authority that can certify that each identity is an independent entity; the latter is difficult even with access to real-world documents [1].…”
Section: Goals and Modelmentioning
confidence: 99%
“…Micropayments [7,8,41,42] can be used to purchase certificates valid for a certain number of minutes or rounds in one or more applications. The seller of such certificates has a much easier task than a certification authority: she does not have to verify the identity of the purchasers, prevent customers from purchasing multiple certificates, or prevent certificates from being transfered.…”
Section: Entry Feesmentioning
confidence: 99%
See 1 more Smart Citation