m walfish m vutukuru h balakrishnan d karger and s shenker
play

M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger and S. Shenker - PowerPoint PPT Presentation

M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger and S. Shenker Presented by Kong Lam Material adapted from authors slides 1 The modern DDoS attacker Tries to make its tra ffj c look legitimate The modern DDoS defender


  1. M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger and S. Shenker Presented by Kong Lam Material adapted from authors’ slides 1

  2.  The modern DDoS attacker ◦ Tries to make its tra ffj c look legitimate  The modern DDoS defender ◦ Detect, then deny  The post-modern DDoS defender (authors) ◦ No attempt at reliable di fg erentiation: 2 2

  3. When a server is under attack, encourage all clients to send more tra ffj c to the server. Isn’t it smarter to do di fg erentiation? 3 3

  4.  Bots send requests that look legitimate ◦ Overloads resource like CPU, disk (not link)  Key challenge: ◦ Can’t tell request was issued with ill intent 4 4

  5.  Server overloaded; drops randomly  Attackers get the bulk of the server  This server allocation is greed-proportional ◦ Must change the allocation, without di fg erentiating good and bad 5 5

  6.  Give out units of service based on client b/w  Why better than greed-proportional? ◦ Because good clients have more spare capacity ◦ Good clients “speak up” 6 6

  7.  Only under server overload: ◦ Front-end admits requests periodically ◦ Which request to admit? “Highest” sender ◦ Others keep sending and eventually win ◦ (Allocation prop. to b/w: proved in paper.) What if other DDoS defense mechanisms throttle clients’ tra ffj c? 7 7

  8.  Needs no client change  JavaScript: ◦ Client constructs 1MByte string ◦ POSTs string in form  Proxy: ends POST after client wins 8 8

  9.  50 clients; all have 2 Mbits/s bandwidth  Vary number of good and bad  Good clients: 2 reqs/s; bad clients: 40 reqs/s  Server capacity: 100 reqs/s 9 9

  10.  Should we allow such use of network b/w?  Other currency schemes are good ◦ Why consume public resource? 10 10

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend