Skip to main content

Taxonomy of Slow DoS Attacks to Web Applications

  • Conference paper
Book cover Recent Trends in Computer Networks and Distributed Systems Security (SNDS 2012)

Abstract

In the last years, Denial of Service (DoS) attacks have been widely spreaded becoming a more than ever relevant threat to network security.

DoS attacks evolved from flood to low bandwidth rate based, making a host unreachable through the usage of a small amount of bandwidth and eluding an Intrusion Detection System more easily.

In this paper, we analyze the most common slow Denial of Service attacks to web applications, proposing a taxonomy to categorize such attacks. The proposal of our work is to make an overview and to classify slow DoS attacks for a better understanding of their action strategy, thus helping developers and network administrators to design proper defense methodologies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kumar, S., Singh, M., Sachdeva, M., Kumar, K.: Flooding Based DDoS Attacks and Their Influence on Web Services. (IJCSIT) International Journal of Computer Science and Information Technologies 2(3), 1131–1136 (2011)

    Google Scholar 

  2. Sachdeva, M., Singh, G., Kumar, K., Singh, K.: DDoS Incidents and their Impact: A Review. International Arab Journal of Information Technology 7(1), 14–20 (2010)

    Google Scholar 

  3. Paxson, V.: An analysis of using reflectors for distributed denial-of-service attacks. Computer Communication Review 31(3), 38–47 (2001)

    Article  Google Scholar 

  4. Keromytis, A.D., Misra, V., Rubenstein, D.: SOS: An architecture for mitigating DDoS attacks. IEEE Journal on Selected Areas in Communications 22(1), 176–188 (2004)

    Article  Google Scholar 

  5. Northcutt, S., Novak, J.: Network intrusion detection, 3rd edn. New Riders, Indianapolis (2002)

    Google Scholar 

  6. Schuba, C.L., Krsul, I.V., Kuhn, M.G., Spafford, E.H., Sundaram, A., Zamboni, D.: Analysis of a denial of service attack on TCP. In: 1997 IEEE Symposium on Security and Privacy - Proceedings, pp. 208–223 (1997)

    Google Scholar 

  7. Douligeris, C., Mitrokotsa, A.: DDoS attacks and defense mechanisms: classification and state-of-the-art. Computer Networks 44(5), 643–666 (2004)

    Article  Google Scholar 

  8. Macia-Fernandez, G., Rodriguez-Gomez, R.A., Diaz-Verdejo, J.E.: Defense techniques for low-rate DoS attacks against application servers. Computer Networks 54(15), 2711–2727 (2010)

    Article  MATH  Google Scholar 

  9. Macia-Fernandez, G., Diaz-Verdejo, J.E., Garcia-Teodoro, P.: Evaluation of a low-rate DoS attack against iterative servers. Computer Networks 51(4), 1013–1030 (2007)

    Article  MATH  Google Scholar 

  10. Macia-Fernandez, G., Diaz-Verdejo, J.E., Garcia-Teodoro, P.: Evaluation of a low-rate DoS attack against application servers. Computers & Security 27(7-8), 335–354 (2008)

    Article  Google Scholar 

  11. Kuzmanovic, A., Knightly, E.W.: Low-rate TCP-targeted denial of service attacks and counter strategies. IEEE-ACM Transactions on Networking 14(4), 683–696 (2006)

    Article  Google Scholar 

  12. Safa, H., Chouman, M., Artail, H., Karam, M.: A collaborative defense mechanism against SYN flooding attacks in IP networks. Journal of Network and Computer Applications 31(4), 509–534 (2008)

    Article  Google Scholar 

  13. Hussain, A., Heidemann, J., Papadopoulos, C.: A framework for classifying denial of service attacks. Computer Communication Review 33(4), 99–110 (2003)

    Google Scholar 

  14. Chen, L.C., Longstaff, T.A., Carley, K.M.: Characterization of defense mechanisms against distributed denial of service attacks. Computers & Security 23(8), 665–678 (2004)

    Article  Google Scholar 

  15. Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS Defense mechanisms. Computer Communication Review 34(2), 39–53 (2004)

    Article  Google Scholar 

  16. Tariq, U., Hong, M.-P., Lhee, K.-S.: A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques. In: Li, X., Zaïane, O.R., Li, Z. (eds.) ADMA 2006. LNCS (LNAI), vol. 4093, pp. 1025–1036. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  17. Guirguis, M., Bestavros, A., Matta, I.: Exploiting the transients of adaptation for RoQ attacks on Internet resources. In: 12th IEEE International Conference on Network Protocols - Proceedings, pp. 184–195 (2004)

    Google Scholar 

  18. Guirguis, M., Bestavros, A., Matta, I., Zhang, Y.T.: Reduction of Quality (RoQ) attacks on Internet end-systems. In: Proceedings of the IEEE Infocom 2005: The Conference on Computer Communications, vol. 1-4, pp. 1362–1372 (2005)

    Google Scholar 

  19. Guirguis, M., Bestavros, A., Matta, I., Zhang, Y.T.: Reduction of quality (RoQ) attacks on dynamic load balancers: Vulnerability assessment and design tradeoffs. In: Infocom 2007, vol. 1-5, pp. 857–865 (2007)

    Google Scholar 

  20. Guirguis, M., Bestavros, A., Matta, I., Zhang, Y.T.: Adversarial exploits of end-systems adaptation dynamics. Journal of Parallel and Distributed Computing 67(3), 318–335 (2007)

    Article  MATH  Google Scholar 

  21. Siris, V.A., Papagalou, F.: Application of anomaly detection algorithms for detecting SYN flooding attacks. Computer Communications 29(9), 1433–1442 (2006)

    Article  Google Scholar 

  22. Huang, Y., Pullen, J.M.: Countering denial-of-service attacks using congestion triggered packet sampling and filtering. In: Proceedings of the Tenth International Conference on Computer Communications and Networks, pp. 490–494 (2001)

    Google Scholar 

  23. Gil, T.M., Poletto, M.: MULTOPS: A data-structure for bandwidth attack detection. In: Usenix Association Proceedings of the 10th Usenix Security Symposium, pp. 23–34 (2001)

    Google Scholar 

  24. Stallings, W.: IPv6: The new Internet protocol. IEEE Communications Magazine 34(7), 96–108 (1996)

    Article  Google Scholar 

  25. Maciá-Fernández, G., Díaz-Verdejo, J.E., García-Teodoro, P., de Toro-Negro, F.: LoRDAS: A Low-Rate DoS Attack against Application Servers. In: Lopez, J., Hämmerli, B.M. (eds.) CRITIS 2007. LNCS, vol. 5141, pp. 197–209. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cambiaso, E., Papaleo, G., Aiello, M. (2012). Taxonomy of Slow DoS Attacks to Web Applications. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2012. Communications in Computer and Information Science, vol 335. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34135-9_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34135-9_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34134-2

  • Online ISBN: 978-3-642-34135-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics