denial of service (dos)inset-csep.cnsi.ucsb.edu/sites/inset-csep.cnsi.ucsb.edu/files/scholar… ·...
TRANSCRIPT
Denial of Service (DOS) Lester Dela Cruz Computer Engineering major at SBCC Mentor: Adam Doupe Department: Computer Science Faculty Advisors: Richard Kemmerer, Christopher Kruegel, Giovanni Vigna
FUNDING: The Office of Naval Research The Army Research Office The National Science Foundation
Denial of Service • Denial of Service:
rendering a system unable to provide services
• Hackers use this attack to manipulate stock exchanges
Types of Denial of Service • Hardware DOS:
breaking the electronics between links
• Application Specific DOS: crashing one specific site
Application Specific DOS Defense • Apps are
made of codes • Codes take
resources • Hackers attack
the parts that take a lot of resources
• Line of Defense: remove the parts that consume the most resources
Mitigation Approach
New Article Show Edit Destroy
Relative Resouce Consumption of Each Operation
Resources for Each Operations in an Application
• Accurately identify which parts consume the most resources • Implement our algorithm • Check our results
New Article Show Edit Destroy
Relative Resource Consumption for Each Operation
Resources for Each Operations in an Application
ABRACADABRA!
Algorithm
Requirements
• Speed • Flexible • Configured • Automated
Website.com
Website.com
Solutions
code
Speed • Initial attempt
• Required external process
• Improved attempt works but not the best
• Final = success!
2:49 2:49 0:10
24:02
2:24 1:03
0
5
10
15
20
25
30
Initial Attempt Improved Attempt Final Attempt
Tim
e of
Exe
cutio
n in
Min
utes
Launching Attempts
Speed Progression
Automation Code
Openstack Bootup
= 1 min – 5 mins
Software in Action
Future Prospects
Algorithm
Future Prospects
… …
No More Crashing
Acknowledgements