Cloud-side shuffling defenses against ddos attacks on proxied multiserver systems

Yuquan Shan, George Kesidis, Daniel Fleck

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

We consider a cloud based multiserver system, consisting of a set of replica application servers behind a set of proxy (indirection) servers which interact directly with clients over the Internet. We address cloud-side proactive and reactive defenses to combat DDoS attacks that may target this system. DDoS attacks are endemic with some notable attacks occurring just this past fall. Volumetric attacks may target proxies while "low volume" attacks may target replicas. After reviewing existing and proposed defenses, such as changing proxy IP addresses (a "moving target" technique to combat the reconnaissance phase of the botnet) and fission of overloaded servers, we focus on evaluation of defenses based on shuffling client-To-server assignments that can be both proactive and reactive to a DDoS attack. Our evaluations are based on a binomial distribution model that well agrees with simulations and preliminary experiments on a prototype that is also described.

Original languageEnglish (US)
Title of host publicationCCSW 2017 - Proceedings of the 2017 Cloud Computing Security Workshop, co-located with CCS 2017
PublisherAssociation for Computing Machinery, Inc
Pages1-10
Number of pages10
ISBN (Electronic)9781450353939
DOIs
StatePublished - Nov 3 2017
Event8th ACM Cloud Computing Security Workshop, CCSW 2017 - Dallas, United States
Duration: Nov 3 2017 → …

Publication series

NameCCSW 2017 - Proceedings of the 2017 Cloud Computing Security Workshop, co-located with CCS 2017

Other

Other8th ACM Cloud Computing Security Workshop, CCSW 2017
Country/TerritoryUnited States
CityDallas
Period11/3/17 → …

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Cloud-side shuffling defenses against ddos attacks on proxied multiserver systems'. Together they form a unique fingerprint.

Cite this