Download presentation
Presentation is loading. Please wait.
Published byChastity Moody Modified over 9 years ago
1
Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds Srikanth Kandula, Dina Katabi, Matthias Jacob, and Arthur Berger Awarded Best Student Paper! (NSDI-2005) Defense by Manan Sanghi
2
Flash Crowd
3
DDOS
4
Botz-4-Sale request
5
Botz-4-Sale Reverse Turing test
6
Botz-4-Sale Solution
7
Botz-4-Sale Welcome! HTTP cookie Allows at most 8 simultaneous connections Valid for 30 minutes
8
Botz-4-Sale request
9
Botz-4-Sale Reverse Turing test
10
Botz-4-Sale request
11
Botz-4-Sale System is Busy, either solve puzzle or try later
12
Botz-4-Sale request
13
Botz-4-Sale Reverse Turing test
14
Botz-4-Sale request
15
Botz-4-Sale System is Busy, either solve puzzle or try later
16
Botz-4-Sale Request …
17
Botz-4-Sale
18
Kill-Bots Overview Graphical Puzzles served during Stage 1
19
Example Normal Load 40% K 1 =70% K 2 =50% Time out (5 minutes) unauthenticated users
20
Two stages in Suspected Attack Mode Stage 1: CAPTCHA based Authentication No state maintenance before authentication HTTP cookie Cryptographic support Stage 2: Authenticating users who do not answer CAPTCHA No more reverse Turing tests Bloom filters to filter out over-zealous zombies
22
Resource Allocation and Admission Control Tradeoff Authenticate new clients Serve already authenticated clients
23
Adaptive Admission Control Cute Queuing Theory type analysis
25
Security Analysis Socially-engineered Attacks Copy Attacks Including IP address in one-way hash does not deal well with proxies and mobile users Replay Attacks Time information in the cookie hash DoS attacks on the authentication mechanism No connection state for unauthenticated clients In-kernel HTTP header processing HTTP headers not parsed Pattern match arguments to GET and Cookie fields Cost : less than 8 s
26
System Architecture
28
Evaluation – Experimental Setup
29
Evaluation
30
Evaluation - Microbenchmarks
31
Evaluation- CyberSlam attacks
33
Evaluation – Flash Crowds
35
On Admission Control Authentication is not sufficient Good performance requires admission control
36
Threat Model Bandwidth floods, DNS entries, routing entries not considered Attacker cannot sniff legitimate users’ packets Attacker cannot access server’s local network Zombies are not as smart as humans Attacker does not have a large number of humans aiding his evil plans
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.