Performance Evaluation of Web Server's Request Queue against AL-DDoS Attacks in NS-2

As the world is getting increasingly dependent on the Internet, the availability of web services has been a key concern for various organizations. Application Layer DDoS (AL-DDoS) attacks may hamper the availability of web services to the legitimate users by flooding the request queue of the web server. Hence, it is pertinent to focus fundamentally on studying the queue scheduling policies of web server against the HTTP request flooding attack which has been the base of this research work. In this paper, the various types of AL-DDoS attacks launched by exploiting the HTTP protocol have been reviewed. The key aim is to compare the requests queue scheduling policies of web server against HTTP request flooding attack using NS2 simulator. Various simulation scenarios have been presented for comparison, and it has been established that queue scheduling policy can be a significant role player in tolerating the AL-DDoS attacks.

[1]  Kuldip Singh,et al.  Performance Analysis of Web Service under DDoS Attacks , 2009, 2009 IEEE International Advance Computing Conference.

[2]  Andreas Terzis,et al.  My Botnet Is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging , 2007, HotBots.

[3]  Hong Li,et al.  Application layer DDoS attack detection using cluster with label based on sparse vector decomposition and rhythm matching , 2015, Secur. Commun. Networks.

[4]  Martine Bellaïche,et al.  Avoiding DDoS with active management of backlog queues , 2011, 2011 5th International Conference on Network and System Security.

[5]  Robert E. McGrath,et al.  Web server technology: the advanced guide for World Wide Web information providers , 1996 .

[6]  Hidema Tanaka,et al.  Analysis of Slow Read DoS attack , 2014, 2014 International Symposium on Information Theory and its Applications.

[7]  Vivek Nigam,et al.  A Selective Defense for Application Layer DDoS Attacks , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.

[8]  Massimiliano Rak,et al.  Intrusion Tolerant Approach for Denial of Service Attacks to Web Services , 2011, 2011 First International Conference on Data Compression, Communications and Processing.

[9]  Wanlei Zhou,et al.  Detection and defense of application-layer DDoS attacks in backbone web traffic , 2014, Future Gener. Comput. Syst..

[10]  Zhoujun Li,et al.  A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks , 2009, Infoscale.

[11]  Jun Xu,et al.  Sustaining Availability of Web Services under Distributed Denial of Service Attacks , 2003, IEEE Trans. Computers.

[12]  Kuldip Singh,et al.  DDoS Incidents and their Impact: A Review , 2010, Int. Arab J. Inf. Technol..

[13]  Alfred V. Aho,et al.  The awk programming language , 1988 .

[14]  L. Schwartz,et al.  Sophisticated Denial of Service attacks aimed at application layer , 2012, 2012 ELEKTRO.

[15]  Ali A. Ghorbani,et al.  A Case Study of Intelligent IDS False Alarm Reduction in Cloud Environments: Challenges and Trends ............................................................................................. YUXIN MENG, WENJUAN LI, AND LAM-FOR KWOK , 2014 .

[16]  Muhammad Kamran Asif,et al.  DDoS attacks and countermeasures in cyberspace , 2015, 2015 2nd World Symposium on Web Applications and Networking (WSWAN).

[17]  Hikmat Farhat Protecting TCP services from denial of service attacks , 2006, LSAD '06.

[18]  Song Guo,et al.  Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyberspace , 2015, IEEE Transactions on Computers.

[19]  Chengxu Ye,et al.  Detection of application layer distributed denial of service , 2011, Proceedings of 2011 International Conference on Computer Science and Network Technology.

[20]  Maurizio Aiello,et al.  Taxonomy of Slow DoS Attacks to Web Applications , 2012, SNDS.

[21]  Supranamaya Ranjan,et al.  DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[22]  Shun-Zheng Yu,et al.  Monitoring the Application-Layer DDoS Attacks for Popular Websites , 2009, IEEE/ACM Transactions on Networking.

[23]  Yue Meng Research on the performance of low-rate DoS attack , 2008 .

[24]  Juho Kim,et al.  DDoS avoidance strategy for service availability , 2011, Cluster Computing.

[25]  Jens Mache,et al.  Hands-on denial of service lab exercises using SlowLoris and RUDY , 2012, InfoSecCD.

[26]  Sonia Fahmy,et al.  Towards user-centric metrics for denial-of-service measurement , 2007, ExpCS '07.

[27]  Muhammad Arif,et al.  Study and Performance Evaluation on Recent DDoS Trends of Attack & Defense , 2013 .

[28]  Shian-Shyong Tseng,et al.  Constructing detection knowledge for DDoS intrusion tolerance , 2004, Expert Syst. Appl..

[29]  Indrakshi Ray,et al.  A Responsive Defense Mechanism Against DDoS Attacks , 2014, FPS.

[30]  Abhinav Bhandari,et al.  Simulation study of application layer DDoS attack , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).

[31]  Geert Deconinck,et al.  Empirical Study of Tolerating Denial-of-Service Attacks with the Fosel Architecture , 2009, 2009 Eighth IEEE International Symposium on Network Computing and Applications.

[32]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.