logins by user joe to machine z
play

# Logins by User Joe to Machine Z 30 25 20 15 10 5 0 A B C - PowerPoint PPT Presentation

# Logins by User Joe to Machine Z 30 25 20 15 10 5 0 A B C D Client System Hour of User Joe's Logins to Machine Z 10 8 Frequency 6 4 2 0 0 5 10 15 20 Hour of Day 1 day of crud seen at ICSI (110K times) Adversary


  1. # Logins by User Joe to Machine Z 30 25 20 15 10 5 0 A B C D Client System

  2. Hour of User Joe's Logins to Machine Z 10 8 Frequency 6 4 2 0 0 5 10 15 20 Hour of Day

  3. 1 day of “ crud ” seen at ICSI (110K times)

  4. Adversary can fill the entire buffer with just a single connection! Policy 1: Restrict per-connection buffer to threshold (= ?)

  5. Adversary can fill the entire buffer with just a single connection! Policy 1: Restrict per-connection buffer to threshold (say 20KB)

  6. • Adversary can create multiple connections to exhaust the buffer! • Policy 2: Do not allow a single host to create two connections with holes

  7. • Adversary attacks from distributed hosts! ( zombies ) – No connection can be isolated as adversary ’ s… all of them look good • Policy 3: Upon buffer exhaustion … – … Evict one buffer page randomly and reallocate it to new packet – Kill the connection of the evicted page (mod details) • And recover all of its pages • If the buffer is large , then most evicted connections belong to the adversary – They fight an uphill battle!

  8. • Suppose total 512 MB, 2KB page, 25KB/conn Avg. Legitimate Buffer = 30 KB

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend