THROTTLING DDoS ATTACKS

Saraiah Gujjunoori, Taqi Ali Syed, Madhu Babu J., Avinash D., Radhesh Mohandas, Alwyn R. Pais

2009

Abstract

Distributed Denial of Service poses a significant threat to the Internet today. In these attacks, an attacker runs a malicious process in compromised systems under his control and generates enormous number of requests, which in turn can easily exhaust the computing resources of a victim web server within a short period of time. Many mechanisms have been proposed till date to combat this attack. In this paper we propose a new solution to reduce the impact of a distributed denial of service attack on a web server by throttling the client’s CPU. The concept of source throttling is used to make the client pay a resource stamp fee, which is negligible when the client is making a limited number of requests but becomes a limiting restriction when he is making a large number of requests. The proposed solution makes use of the integer factorization problem to generate the CPU stamps. We have packaged our solution as an API so that existing web applications can easily deploy our solution in a layer that is transparent to the underlying application.

Download


Paper Citation


in Harvard Style

Gujjunoori S., Ali Syed T., Babu J. M., D. A., Mohandas R. and R. Pais A. (2009). THROTTLING DDoS ATTACKS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 121-126. DOI: 10.5220/0002229001210126

in Bibtex Style

@conference{secrypt09,
author={Saraiah Gujjunoori and Taqi Ali Syed and Madhu Babu J. and Avinash D. and Radhesh Mohandas and Alwyn R. Pais},
title={THROTTLING DDoS ATTACKS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={121-126},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002229001210126},
isbn={978-989-674-005-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - THROTTLING DDoS ATTACKS
SN - 978-989-674-005-4
AU - Gujjunoori S.
AU - Ali Syed T.
AU - Babu J. M.
AU - D. A.
AU - Mohandas R.
AU - R. Pais A.
PY - 2009
SP - 121
EP - 126
DO - 10.5220/0002229001210126