Denial of Service (DOS) Les Lester er Dela ela Cruz uz Comput omputer er Engineer ngineering ing major major at SBCC Ment entor or: : Adam dam Doupe oupe Depar epartment ment: : Comput omputer er Science cience Facult aculty Adv dvis isor ors: : Ric ichar hard d Kemmer emmerer er, , Chr hris istopher opher Kr Krue uegel gel, , Gio Giovanni anni Vigna igna FUNDING: The Office of Naval Research The Army Research Office The National Science Foundation
Denial of Service • Denial of Service: rendering a system unable to provide services • Hackers use this attack to manipulate stock exchanges
Types of Denial of Service • Hardware DOS: breaking the electronics betwee links • Application Specifi DOS: crashing one specific site
Application Specific DOS Defense • Apps are made of codes • Codes take resources • Hackers attack the parts that take a lot of resources • Line of Defense: remove the parts that consume the most resources
Mitigation Approach Algorithm Resources for Each Operations in an Resources for Each Operations in an Application Application New Article Show Edit Destroy New Article Show Edit Destroy Relative Resouce Consumption of Each Operation Relative Resource Consumption for Each Operation ABRACADABRA! • Accurately identify which parts consume the most resources • Implement our algorithm • Check our results
Requirements • Speed • Flexible • Configured Website.com • Automated Website.com
Solutions code
Speed • Initial attempt Speed Progression • Required external 30 process • Improved attempt works 25 Automation Code but not the best 20 • Final = success! Openstack Bootup 15 24:02 10 5 = 1 min – 5 mins 1:03 2:24 0:10 2:49 2:49 0 Initial Attempt Improved Attempt Final Attempt Launching Attempts
Software in Action
Algorithm Future Prospects
Future Prospects … …
No More Crashing
Acknowledgements
Recommend
More recommend