skip to main content
research-article

Mitigating DoS Attacks Using Performance Model-Driven Adaptive Algorithms

Published:01 March 2014Publication History
Skip Abstract Section

Abstract

Denial of Service (DoS) attacks overwhelm online services, preventing legitimate users from accessing a service, often with impact on revenue or consumer trust. Approaches exist to filter network-level attacks, but application-level attacks are harder to detect at the firewall. Filtering at this level can be computationally expensive and difficult to scale, while still producing false positives that block legitimate users.

This article presents a model-based adaptive architecture and algorithm for detecting DoS attacks at the web application level and mitigating them. Using a performance model to predict the impact of arriving requests, a decision engine adaptively generates rules for filtering traffic and sending suspicious traffic for further review, where the end user is given the opportunity to demonstrate they are a legitimate user. If no legitimate user responds to the challenge, the request is dropped. Experiments performed on a scalable implementation demonstrate effective mitigation of attacks launched using a real-world DoS attack tool.

References

  1. APERA. 2009. Application Performance Evaluation and Resource Allocator (APERA). http://www.alphaworks.ibm.com/tech/apera.Google ScholarGoogle Scholar
  2. Balbo, G. and Serazzi, G. 1997. Asymptotic analysis of multiclass closed queueing networks: Multiple bottlenecks. Performance Eval. 30, 3, 115--152. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Barna, C., Litoiu, M., and Ghanbari, H. 2011. Autonomic load-testing framework. In Proceedings of the International Conference on Autonomic Computing (ICAC’11). ACM, New York, 91--100. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Barna, C., Shtern, M., Smit, M., Tzerpos, V., and Litoiu, M. 2012. Model-based adaptive dos attack mitigation. In Proceedings of the ICSE Workshop on Software Engineering for Adaptive qnd Self-Managing Systems (SEAMS’12). ACM, New York, 119--128.Google ScholarGoogle Scholar
  5. Dobbins, R., Morales, C., Anstee, D., Arruda, J., Bienkowski, T., Hollyman, M., Labovitz, C., Nazario, J., Seo, E., and Shah, R. 2010. Worldwide InfrastructUre security report. Tech. rep., Arbor Networks.Google ScholarGoogle Scholar
  6. Eager, D. L. and Sevcik, K. C. 1983. Performance bound hierarchies for queueing networks. ACM Trans. Comput. Syst. 1, 2, 99--115. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Franks, G., Maly, P., Woodside, M., Petriu, D. C., Hubbard, A., and Mroz, M. 2012. Layered Queueing Network Solver (LQNS). http://www.sce.carleton.ca/rads/lqns.Google ScholarGoogle Scholar
  8. Garg, A. and Narasimha Reddy, A. L. 2002. Mitigation of DoS attacks through QoS regulation. In Proceedings of the 10th IEEE International Workshop on Quality of Service. IEEE, 45--53.Google ScholarGoogle Scholar
  9. Ghanbari, H., Barna, C., Litoiu, M., Woodside, M., Zheng, T., Wong, J., and Iszlai, G. 2011. Tracking adaptive performance models using dynamic clustering of user classes. In Proceedings of the 2nd ACM International Conference on Performance Engineering (ICPE’11). ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Gomaa, H. and Menascé, D. A. 2001. Performance engineering of component-based distributed software systems. In Performance Engineering, State of the Art and Current Trends, Springer, 40--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Gunther, N. J. 2006. Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and Services. Springer Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Imre, G., Levendovszky, T., and Charaf, H. 2007. Modeling the effect of application server settings on the performance of j2ee web applications. In Proceedings of the 2nd International Conference on Trends in Enterprise Application Architecture (TEAA’06). Springer, 202--216. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Jain, P., Jain, J., and Gupta, Z. 2011. Mitigation of denial of service (DoS) attack. Int. J. Comput.l Eng. Manage. 11, 38--44.Google ScholarGoogle Scholar
  14. Jiang, Z. M., Hassan, A. E., Hamann, G., and Flora, P. 2009. Automated performance analysis of load tests. In Proceedings of the IEEE International Conference on Software Maintenance (ICSM’09). IEEE, 125--134.Google ScholarGoogle Scholar
  15. Juels, A. and Brainard, J. G. 1999. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proceedings of the Network and Distributed System Security Symposium. The Internet Society.Google ScholarGoogle Scholar
  16. Kalman, R. E. 1960. A new approach to linear filtering and prediction problems. Trans. ASME--J Basic Engineering 82, Series D, 35--45.Google ScholarGoogle ScholarCross RefCross Ref
  17. Kargl, F. and Maier, J. 2001. Protecting web servers from distributed denial of service attacks. In Proceedings of the 10th International Conference on World Wide Web. 514--524. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Khattab, S. M., Sangpachatanaruk, C., Melhem, R., Mosse, D., and Znati, T. 2003. Proactive server roaming for mitigating denial-of-service attacks. In Proceedings of the International Conference on Information Technology: Research and Education. 286--290.Google ScholarGoogle Scholar
  19. Lazowska, E. D., Zahorjan, J., Graham, G. S., and Sevcik, K. C. 1984. Quantitative System Performance: Computer System Analysis Using Queueing Network Models. Prentice-Hall, Inc., Upper Saddle River, NJ. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Litoiu, M. 2007. A performance analysis method for autonomic computing systems. ACM Trans. Auton. Adap. Syst. 2, 1, 3. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Litoiu, M. and Barna, C. 2012. A perfonnance analysis method for autonomic computing systems. ACM Trans. Auton. Adapt. Syst. 2, 1, 3. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Litoiu, M., Rolia, J., and Serazzi, G. 2000. Designing process replication and activation: A quantitative approach. IEEE Trans. Softw. Eng. 26, 12, 1168--1178. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Litoiu, M., Woodside, M., and Zheng, T. 2005. Hierarchical model-based autonomic control of software systems. SIGSOFT Softw. Eng. Notes 30, 4, 1--7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Long, M., Wu, C.-H. J., Hung, J. Y., and Irwin, J. D. 2004. Mitigating performance degradation of network-based control systems under denial of service attacks. In Proceedings of the 30th Annual Conference of the IEEE Industrial Electronics Society (IECON’04). Vol. 3, IEEE, 2339--2342.Google ScholarGoogle Scholar
  25. Malik, H., Adams, B., Hassan, A. E., Flora, P., and Hamann, G. 2010. Using load tests to automatically compare the subsystems of a large enterprise system. In Proceedings of the IEEE 34th Annual Computer Software and Applications Conference (COMPSAC’10). IEEE, 117--126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Menascé, D. A. 2002. Simple analytic modeling of software contention. SIGMETRICS Perform. Eval. Rev. 29, 4, 24--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Menascé, D. A. and Almeida, V. A. F. 1998. Capacity Planning for Web Performance: Metrics, Models, and Methods. Prentice-Hall, Inc., Upper Saddle River, NJ. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Menascé, D. A. and Almeida, V. A. F. 2000. Scaling for E Business: Technologies, Models, Performance, and Capacity Planning. Prentice Hall PTR, Upper Saddle River, NJ. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Mirković, J. 2002. D-WARD: DDoS Network Attack Recognition and Defense. http://fmg-www.cs.ucla.edu/ddos.Google ScholarGoogle Scholar
  30. Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., and Rajarajan, M. 2013. A survey of intrusion detection techniques in cloud. J. Network Computer Appl. 36, 1, 42--57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Morein, W. G., Stavrou, A., Cook, D. L., Keromytis, A. D., Misra, V., and Rubenstein, D. 2003. Using graphic turing tests to counter automated DDoS attacks against web servers. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS’03). ACM, New York, 8--19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Nguyen, T. H., Doan, C. T., Nguyen, V. Q., Nguyen, T. H. T., and Doan, M. P. 2011. Distributed defense of distributed DoS using pushback and communicate mechanism. In Proceedings of the International Advanced Technologies for Communications Conference. 178--182.Google ScholarGoogle Scholar
  33. OPERA. 2013. Optimization, Performance Evaluation and Resource Allocator (OPERA). http://www.ceraslabs.com/technologies/opera.Google ScholarGoogle Scholar
  34. Oshima, S., Nakashima, T., and Sueyoshi, T. 2010. Early DoS/DDoS detection method using short-term statistics. In Proceedings of the International Complex, Intelligent and Software Intensive Systems Conference. 168--173. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Pandey, A. K. and Pandu Rangan, C. 2011. Mitigating denial of service attack using proof of work and token bucket algorithm. In Proceedings of the IEEE Students’ Technology Symposium. 43--47.Google ScholarGoogle Scholar
  36. Reiser, M. and Lavenberg, S. S. 1980. Mean-value analysis of closed multichain queuing networks. J. ACM 27, 2, 313--322. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Rolia, J. A. and Sevcik, K. C. 1995. The method of layers. IEEE Trans. Softw. Eng. 21 8, 689--700. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Roman, J., Radek, B., Radek, V., and Libor, S. 2011. Launching distributed denial of service attacks by network protocol exploitation. In Proceedings of the 2nd International Conference on Applied Informatics and Computing Theory (AICT’11). World Scientific and Engineering Academy and Society (WSEAS), Stevens Point, WI, 210--216. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Sachdeva, M., Singh, G., and Kumar, K. 2011. Deployment of distributed defense against DDoS attacks in ISP domain. Int. J. Comput. Appl. 15, 2, 25--31.Google ScholarGoogle ScholarCross RefCross Ref
  40. Sopitkamol, M. and Menascé, D. A. 2005. A method for evaluating the impact of software configuration parameters on e-commerce sites. In Proceedings of the 5th International Workshop on Software and Performance (WOSP’05). ACM, New York, 53--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Thakkar, D. 2009. Automated capacity planning and support for enterprise applications. M.S. thesis, Queens University.Google ScholarGoogle Scholar
  42. Thakkar, D., Hassan, A. E., Hamann, G., and Flora, P. 2008. A framework for measurement based performance modeling. In Proceedings of the 7th International Workshop on Software and Performance (WOSP’08). ACM, New York, 55--66. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. The Hacker’s Choice. 2012. THC SSL DOS. http://thehackerschoice.wordpress.com/2011/10/24/thc-ssl-dos.Google ScholarGoogle Scholar
  44. Woodside, M., Zheng, T., and Litoiu, M. 2005. The use of optimal filters to track parameters of performance models. In Proceedings of the 2nd International Conference on the Quantitative Evaluation of Systems (QEST’05). IEEE, 74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Wu, X. and Yau, Y. D. K. 2007. Mitigating denial-of-service attacks in MANET by incentive based packet filtering: A game-theoretic approach. In Proceedings of the 3rd International Conference on Security and Privacy in Communications Networks and the Workshops (SecureComm’07). 310--319.Google ScholarGoogle Scholar
  46. Zahorjan, J., Sevcik, K. C., Eager, D. L., and Galler, B. I. 1981. Balanced job bound analysis of queueing networks. In Proceedings of the ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems (SIGMETRICS’81). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Zheng, T., Yang, J., Woodside, M., Litoiu, M., and Iszlai, G. 2005. Tracking time-varying parameters in software systems with extended Kalman filters. In Proceedings of the Conference of the Centre for Advanced Studies on Collaborative Research (CASCON’05). IBM Press, 334--345. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Zuckerman, E., Roberts, H., McGrady, R., York, J., and Palfrey, J. 2010. Distributed Denial of Service Attacks Against Independent Media and Human Rights Sites. Berkman Center for Internet & Society.Google ScholarGoogle Scholar

Index Terms

  1. Mitigating DoS Attacks Using Performance Model-Driven Adaptive Algorithms

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on Autonomous and Adaptive Systems
            ACM Transactions on Autonomous and Adaptive Systems  Volume 9, Issue 1
            March 2014
            121 pages
            ISSN:1556-4665
            EISSN:1556-4703
            DOI:10.1145/2597760
            Issue’s Table of Contents

            Copyright © 2014 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 March 2014
            • Revised: 1 January 2014
            • Accepted: 1 December 2013
            • Received: 1 April 2013
            Published in taas Volume 9, Issue 1

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader