Download presentation
Presentation is loading. Please wait.
Published byOscar Jennings Modified over 8 years ago
1
KEYNOTE OF THE FUTURE 3: DAVID BECKETT CSIT PhD Student QUEEN’S UNIVERSITY BELFAST
2
@CSIT_QUB Detection, Mitigation and Prevention of Emerging Application Layer DDoS Attacks David Beckett, PhD Student 20/03/2015
3
Overview of Distributed Denial of Service (DDoS) Emerging Application Layer Attacks State of the art Detection and Mitigation methods Future Plans DDoS - Distributed Denial of Service
4
Distributed Denial of Service (DDoS) Attack An attempt to make a network or server unavailable to its intended users DDoS - Distributed Denial of Service
5
2008 2009 2010 2014 2007 DDoS Attacks 2010
6
Types of Attacks Infrastructure Layer (3,4) Application Layer (7) Bandwidth CPU Conns CPU Mem Sessions
7
DDoS attack types observed by Arbor Networks (2014)
8
Why will application layer attacks become popular? Content Delivery Networks -Cache static content -Global network with large infrastructure Content Delivery Networks -Cache static content -Global network with large infrastructure Infrastructure Layer (3,4) Application Layer (7) Dynamic Application Layer Attack L3/L4 DDoS Bypass CDN protection Lower bandwidth required Difficult to detect Bypass CDN protection Lower bandwidth required Difficult to detect Firewall Protection -SYN Cookies -Signature rules for fragmented packets Firewall Protection -SYN Cookies -Signature rules for fragmented packets CDN absorbs the attack
9
HTTP GET – Attacker profiles the website and requests resources with large computation loads. HTTP POST - Slow Post Attack, Sends 1000 byte form post, 1 byte every 110 seconds. SSL Attack - Creates many SSL connections, the server has a larger workload than the client. Layer 7 Request Floods CPU Sessions CPU Mem Sessions Emerging Application Layer Attacks
10
State of the Art Detection Methods User Behavior Resource Popularity Page transitions using Hidden Markov Model Layer 7 Timing Statistics Compare page size vs browsing time GET/POST request frequencies Hidden Decoy Links Home Item Basket Pay 3s 9s 4s
11
State of the Art Mitigation Methods User Puzzles – CAPTCHAs Cryptographic Puzzles Network Puzzles Cloud Computing
12
Targeted Detection Approach Resource Monitoring CPU Usage Memory Usage Session Usage Anomaly Detection Anomaly Detection
13
Targeted Mitigation Approach Use of Software Defined Infrastructure (SDI) to Re-route suspicious traffic to decoy servers Minimise damage Further analysis Scale server resources
14
Identify attackers by their affect not their behaviour Light weight Detect low rate attacks Can detect zero day attacks Future Plans Creation of attack classifier Further development of test bed Summary and Future Plan
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.