Issue No. 08 - August (2010 vol. 21)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TPDS.2009.147
Ying Xuan , University of Florida, Gainesville
Incheol Shin , University of Florida, Gainesville
My T. Thai , University of Florida, Gainesville
Taieb Znati , University of Pittsburgh, Pittsburgh
Application DoS attack, which aims at disrupting application service rather than depleting the network resource, has emerged as a larger threat to network services, compared to the classic DoS attack. Owing to its high similarity to legitimate traffic and much lower launching overhead than classic DDoS attack, this new assault type cannot be efficiently detected or prevented by existing detection solutions. To identify application DoS attack, we propose a novel group testing (GT)-based approach deployed on back-end servers, which not only offers a theoretical method to obtain short detection delay and low false positive/negative rate, but also provides an underlying framework against general network attacks. More specifically, we first extend classic GT model with size constraints for practice purposes, then redistribute the client service requests to multiple virtual servers embedded within each back-end server machine, according to specific testing matrices. Based on this framework, we propose a two-mode detection mechanism using some dynamic thresholds to efficiently identify the attackers. The focus of this work lies in the detection algorithms proposed and the corresponding theoretical complexity analysis. We also provide preliminary simulation results regarding the efficiency and practicability of this new scheme. Further discussions over implementation issues and performance enhancements are also appended to show its great potentials.
Application DoS, group testing, network security.
M. T. Thai, I. Shin, Y. Xuan and T. Znati, "Detecting Application Denial-of-Service Attacks: A Group-Testing-Based Approach," in IEEE Transactions on Parallel & Distributed Systems, vol. 21, no. , pp. 1203-1216, 2009.