skip to main content
10.1145/511446.511485acmconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
Article

Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites

Published:07 May 2002Publication History

ABSTRACT

The paper studies two types of events that often overload Web sites to a point when their services are degraded or disrupted entirely - flash events (FEs) and denial of service attacks (DoS). The former are created by legitimate requests and the latter contain malicious requests whose goal is to subvert the normal operation of the site. We study the properties of both types of events with a special attention to characteristics that distinguish the two. Identifying these characteristics allows a formulation of a strategy for Web sites to quickly discard malicious requests. We also show that some content distribution networks (CDNs) may not provide the desired level of protection to Web sites against flash events. We therefore propose an enhancement to CDNs that offers better protection and use trace-driven simulations to study the effect of our enhancement on CDNs and Web sites.

References

  1. CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoong Attacks. http://www.cert.org/advisories/CA-1996-21.html, Sept. 1996.Google ScholarGoogle Scholar
  2. Denial of Service Attacks. http://www.cert.org/tech_tips/denial_of_service.html, 1999. CERT Coordination Center.Google ScholarGoogle Scholar
  3. G. Abdulla, E. A. Fox, M. Abrams, and S. Williams. WWW Proxy Trac Characterization with Application to Caching. Technical Report TR-97-03, Computer Science Dept., Virginia Tech, Mar. 1997. Google ScholarGoogle Scholar
  4. V. Almeida, D. Menasce, R. Reidi, F. Peligrinelli, R. Fonseca, and W. M. Jr. Analyzing Web Robots and their Impact on Caching. In Proceedings of the 6th Web Caching and Content Delivery Workshop, June 2001.Google ScholarGoogle Scholar
  5. M. Arlitt and T. Jin. Workload Characterization of the 1998 World Cup Web Site. HPL-1999-35R1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. F. Arlitt and C. L. Williamson. Internet Web servers: workload characterization and performance implications. IEEE/ACM Transactions on Networking, 5(5):631--645, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. P. Barford and M. Crovella. Generating Representative Web Workloads for Network and Server Performance Evaluation. In Measurement and Modeling of Computer Systems, pages 151160, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. P. Barford and D. Plonka. Characteristics of Network Traffic Flow Anomalies. In Proceedings of the ACM SIGCOMM Internet Measurement Workshop, Nov. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Chankhunthod, P. Danzig, C. Neerdaels, M. F. Schwartz, and K. J. Worrell. A Hierarchical Internet Object Cache. In Proceedings of the USENIX 1996 Annual Technical Conference, January 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. E. Crovella, R. Frangioso, and M. Harchol-Balter. Connection Scheduling in Web Servers. In Proceedings of the USENIX Symposium on Internet Technologies and Systems (USITS'99), Oct. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. F. Douglis, A. Feldmann, B. Krishnamurthy, and J. C. Mogul. Rate of Change and other Metrics: a Live Study of the World Wide Web. In USENIX Symposium on Internet Technologies and Systems, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Floyd, S. Bellovin, J. Ioannidis, K. Kompella, R. Mahajan, and V. Paxson. Pushback Messages for Controlling Aggregates in the Network. http://search.ietf.org/internet-drafts/draft-floyd-pushback-messages-00.txt.Google ScholarGoogle Scholar
  13. K. J. Houle, G. M. Weaver, N. Long, and R. Thomas. Trends in Denial of Service Attack Technology. http://www.cert.org/archive/pdf/DoS_trends.pdf.Google ScholarGoogle Scholar
  14. Internet Cache Protocol (ICP), version 2. RFC 2186, Sept. 1997.Google ScholarGoogle Scholar
  15. Internet Software Consortium. The Berkeley Internet Name Daemon. http://www.isc.org/products/BIND/.Google ScholarGoogle Scholar
  16. A. K. Iyengar, M. S. Squillante, and L. Zhang. Analysis and characterization of large-scale Web server access patterns and performance. World Wide Web, June 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. B. Jones. Interposition Agents: Transparently Interposing User Code at the System Interface. In Symposium on Operating Systems Principles, pages 80--93, 1993. http://www.research.microsoft.com/~mbj/papers/sosp93.ps. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. E. Krell and B. Krishnamurthy. COLA: Customized Overlaying. In Proceedings of the USENIX San Francisco Winter 1992 Conference, pages 3--7, 1992.Google ScholarGoogle Scholar
  19. B. Krishnamurthy and M. Arlitt. PRO-COW: Protocol Compliance on the Web, Nov. 1999. Invited plenary session talk at 46th IETF meeting, Washington D.C. http://www.research.att.com/~bala/papers/ietf99.ps. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. B. Krishnamurthy and J. Wang. On Network-Aware Clustering of Web Clients. In Proceedings of the ACM SIGCOMM, Aug. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. Lorenz. Is your Web site ready for the ash crowd? http://www.serverworldmagazine.com/sunserver/ 2000/11/flash.shtml.Google ScholarGoogle Scholar
  22. S. Michel, K. Nguyen, A. Rosenstein, L. Zhang, S. Floyd, and V. Jacobson. Adaptive Web caching: towards a new global caching architecture. Computer Networks And ISDN Systems, 30(22--23):21692177, Nov. 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. D. Moore. The Spread of the Code-Red Worm (CRv2). http://www.caida.org/analysis/security/ code-red/coderedv2_analysis.xml, Aug. 2001.Google ScholarGoogle Scholar
  24. L. Niven. Flash crowd. In The Flight of the Horse. Ballantine Books, 1971.Google ScholarGoogle Scholar
  25. K. Park and H. Lee. On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets. In Proceedings of the ACM SIGCOMM, Aug. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. A. Rousskov and V. Soloviev. A Performance Study of the Squid Proxy on HTTP/1.0. World Wide Web, pages 47--67, June 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. B. Trott. Victoria's Secret for Webcasts is IP multicasting, August 1999. http://www.infoworld.com/articles/hn/xml/99/ 08/16/990816hnmentors.xml.Google ScholarGoogle Scholar
  28. D. Wessels. Report on the effect of the Independent Council Report on the NLANR Web Caches. http://www.ircache.net/Statistics/ICreport/.Google ScholarGoogle Scholar

Index Terms

  1. Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              WWW '02: Proceedings of the 11th international conference on World Wide Web
              May 2002
              754 pages
              ISBN:1581134495
              DOI:10.1145/511446

              Copyright © 2002 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 7 May 2002

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              Overall Acceptance Rate1,899of8,196submissions,23%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader