m walfish m vutukuru h balakrishnan d karger and s shenker
play

M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger and S. Shenker - PowerPoint PPT Presentation

M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger and S. Shenker Presented by Kong Lam Material adapted from authors slides 1 The modern DDoS attacker Tries to make its tra ffj c look legitimate The modern DDoS defender


  1. M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger and S. Shenker Presented by Kong Lam Material adapted from authors’ slides 1

  2.  The modern DDoS attacker ◦ Tries to make its tra ffj c look legitimate  The modern DDoS defender ◦ Detect, then deny  The post-modern DDoS defender (authors) ◦ No attempt at reliable di fg erentiation: 2 2

  3. When a server is under attack, encourage all clients to send more tra ffj c to the server. Isn’t it smarter to do di fg erentiation? 3 3

  4.  Bots send requests that look legitimate ◦ Overloads resource like CPU, disk (not link)  Key challenge: ◦ Can’t tell request was issued with ill intent 4 4

  5.  Server overloaded; drops randomly  Attackers get the bulk of the server  This server allocation is greed-proportional ◦ Must change the allocation, without di fg erentiating good and bad 5 5

  6.  Give out units of service based on client b/w  Why better than greed-proportional? ◦ Because good clients have more spare capacity ◦ Good clients “speak up” 6 6

  7.  Only under server overload: ◦ Front-end admits requests periodically ◦ Which request to admit? “Highest” sender ◦ Others keep sending and eventually win ◦ (Allocation prop. to b/w: proved in paper.) What if other DDoS defense mechanisms throttle clients’ tra ffj c? 7 7

  8.  Needs no client change  JavaScript: ◦ Client constructs 1MByte string ◦ POSTs string in form  Proxy: ends POST after client wins 8 8

  9.  50 clients; all have 2 Mbits/s bandwidth  Vary number of good and bad  Good clients: 2 reqs/s; bad clients: 40 reqs/s  Server capacity: 100 reqs/s 9 9

  10.  Should we allow such use of network b/w?  Other currency schemes are good ◦ Why consume public resource? 10 10

Recommend


More recommend