Abstract
In the last years, Denial of Service (DoS) attacks have been widely spreaded becoming a more than ever relevant threat to network security.
DoS attacks evolved from flood to low bandwidth rate based, making a host unreachable through the usage of a small amount of bandwidth and eluding an Intrusion Detection System more easily.
In this paper, we analyze the most common slow Denial of Service attacks to web applications, proposing a taxonomy to categorize such attacks. The proposal of our work is to make an overview and to classify slow DoS attacks for a better understanding of their action strategy, thus helping developers and network administrators to design proper defense methodologies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kumar, S., Singh, M., Sachdeva, M., Kumar, K.: Flooding Based DDoS Attacks and Their Influence on Web Services. (IJCSIT) International Journal of Computer Science and Information Technologies 2(3), 1131–1136 (2011)
Sachdeva, M., Singh, G., Kumar, K., Singh, K.: DDoS Incidents and their Impact: A Review. International Arab Journal of Information Technology 7(1), 14–20 (2010)
Paxson, V.: An analysis of using reflectors for distributed denial-of-service attacks. Computer Communication Review 31(3), 38–47 (2001)
Keromytis, A.D., Misra, V., Rubenstein, D.: SOS: An architecture for mitigating DDoS attacks. IEEE Journal on Selected Areas in Communications 22(1), 176–188 (2004)
Northcutt, S., Novak, J.: Network intrusion detection, 3rd edn. New Riders, Indianapolis (2002)
Schuba, C.L., Krsul, I.V., Kuhn, M.G., Spafford, E.H., Sundaram, A., Zamboni, D.: Analysis of a denial of service attack on TCP. In: 1997 IEEE Symposium on Security and Privacy - Proceedings, pp. 208–223 (1997)
Douligeris, C., Mitrokotsa, A.: DDoS attacks and defense mechanisms: classification and state-of-the-art. Computer Networks 44(5), 643–666 (2004)
Macia-Fernandez, G., Rodriguez-Gomez, R.A., Diaz-Verdejo, J.E.: Defense techniques for low-rate DoS attacks against application servers. Computer Networks 54(15), 2711–2727 (2010)
Macia-Fernandez, G., Diaz-Verdejo, J.E., Garcia-Teodoro, P.: Evaluation of a low-rate DoS attack against iterative servers. Computer Networks 51(4), 1013–1030 (2007)
Macia-Fernandez, G., Diaz-Verdejo, J.E., Garcia-Teodoro, P.: Evaluation of a low-rate DoS attack against application servers. Computers & Security 27(7-8), 335–354 (2008)
Kuzmanovic, A., Knightly, E.W.: Low-rate TCP-targeted denial of service attacks and counter strategies. IEEE-ACM Transactions on Networking 14(4), 683–696 (2006)
Safa, H., Chouman, M., Artail, H., Karam, M.: A collaborative defense mechanism against SYN flooding attacks in IP networks. Journal of Network and Computer Applications 31(4), 509–534 (2008)
Hussain, A., Heidemann, J., Papadopoulos, C.: A framework for classifying denial of service attacks. Computer Communication Review 33(4), 99–110 (2003)
Chen, L.C., Longstaff, T.A., Carley, K.M.: Characterization of defense mechanisms against distributed denial of service attacks. Computers & Security 23(8), 665–678 (2004)
Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS Defense mechanisms. Computer Communication Review 34(2), 39–53 (2004)
Tariq, U., Hong, M.-P., Lhee, K.-S.: A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques. In: Li, X., Zaïane, O.R., Li, Z. (eds.) ADMA 2006. LNCS (LNAI), vol. 4093, pp. 1025–1036. Springer, Heidelberg (2006)
Guirguis, M., Bestavros, A., Matta, I.: Exploiting the transients of adaptation for RoQ attacks on Internet resources. In: 12th IEEE International Conference on Network Protocols - Proceedings, pp. 184–195 (2004)
Guirguis, M., Bestavros, A., Matta, I., Zhang, Y.T.: Reduction of Quality (RoQ) attacks on Internet end-systems. In: Proceedings of the IEEE Infocom 2005: The Conference on Computer Communications, vol. 1-4, pp. 1362–1372 (2005)
Guirguis, M., Bestavros, A., Matta, I., Zhang, Y.T.: Reduction of quality (RoQ) attacks on dynamic load balancers: Vulnerability assessment and design tradeoffs. In: Infocom 2007, vol. 1-5, pp. 857–865 (2007)
Guirguis, M., Bestavros, A., Matta, I., Zhang, Y.T.: Adversarial exploits of end-systems adaptation dynamics. Journal of Parallel and Distributed Computing 67(3), 318–335 (2007)
Siris, V.A., Papagalou, F.: Application of anomaly detection algorithms for detecting SYN flooding attacks. Computer Communications 29(9), 1433–1442 (2006)
Huang, Y., Pullen, J.M.: Countering denial-of-service attacks using congestion triggered packet sampling and filtering. In: Proceedings of the Tenth International Conference on Computer Communications and Networks, pp. 490–494 (2001)
Gil, T.M., Poletto, M.: MULTOPS: A data-structure for bandwidth attack detection. In: Usenix Association Proceedings of the 10th Usenix Security Symposium, pp. 23–34 (2001)
Stallings, W.: IPv6: The new Internet protocol. IEEE Communications Magazine 34(7), 96–108 (1996)
Maciá-Fernández, G., Díaz-Verdejo, J.E., García-Teodoro, P., de Toro-Negro, F.: LoRDAS: A Low-Rate DoS Attack against Application Servers. In: Lopez, J., Hämmerli, B.M. (eds.) CRITIS 2007. LNCS, vol. 5141, pp. 197–209. Springer, Heidelberg (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cambiaso, E., Papaleo, G., Aiello, M. (2012). Taxonomy of Slow DoS Attacks to Web Applications. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2012. Communications in Computer and Information Science, vol 335. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34135-9_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-34135-9_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34134-2
Online ISBN: 978-3-642-34135-9
eBook Packages: Computer ScienceComputer Science (R0)