loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Saraiah Gujjunoori ; Taqi Ali Syed ; Madhu Babu J. ; Avinash D. ; Radhesh Mohandas and Alwyn R. Pais

Affiliation: National Institute of Technology Karnataka, India

ISBN: 978-989-674-005-4

Keyword(s): Source throttling, Distributed denial of service, Integer factorization, CPU stamps, Request stamping.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Network Security ; Web Performance and Reliability

Abstract: Distributed Denial of Service poses a significant threat to the Internet today. In these attacks, an attacker runs a malicious process in compromised systems under his control and generates enormous number of requests, which in turn can easily exhaust the computing resources of a victim web server within a short period of time. Many mechanisms have been proposed till date to combat this attack. In this paper we propose a new solution to reduce the impact of a distributed denial of service attack on a web server by throttling the client’s CPU. The concept of source throttling is used to make the client pay a resource stamp fee, which is negligible when the client is making a limited number of requests but becomes a limiting restriction when he is making a large number of requests. The proposed solution makes use of the integer factorization problem to generate the CPU stamps. We have packaged our solution as an API so that existing web applications can easily deploy our solution in a l ayer that is transparent to the underlying application. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.233.226.151

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Gujjunoori S.; Ali Syed T.; Babu J. M.; D. A.; Mohandas R.; R. Pais A. and (2009). THROTTLING DDoS ATTACKS.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 121-126. DOI: 10.5220/0002229001210126

@conference{secrypt09,
author={Saraiah Gujjunoori and Taqi {Ali Syed} and Madhu {Babu J.} and Avinash D. and Radhesh Mohandas and Alwyn {R. Pais}},
title={THROTTLING DDoS ATTACKS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={121-126},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002229001210126},
isbn={978-989-674-005-4},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - THROTTLING DDoS ATTACKS
SN - 978-989-674-005-4
AU - Gujjunoori, S.
AU - Ali Syed, T.
AU - Babu J., M.
AU - D., A.
AU - Mohandas, R.
AU - R. Pais, A.
PY - 2009
SP - 121
EP - 126
DO - 10.5220/0002229001210126

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.