Tail attacks on web applications
Document Type
Conference Proceeding
Publication Date
10-30-2017
Abstract
As the extension of Distributed Denial-of-Service (DDoS) attacks to application layer in recent years, researchers pay much interest in these new variants due to a low-volume and intermittent pattern with a higher level of stealthiness, invaliding the state-of-the-art DDoS detection/defense mechanisms. We describe a new type of low-volume application layer DDoS attack-Tail Attacks on Web Applications. Such attack exploits a newly identified system vulnerability of n-tier web applications (millibottlenecks with sub-second duration and resource contention with strong dependencies among distributed nodes) with the goal of causing the long-tail latency problem of the target web application (e.g., 95th percentile response time > 1 second) and damaging the long-term business of the service provider, while all the system resources are far from saturation, making it difficult to trace the cause of performance degradation. We present a modified queueing network model to analyze the impact of our attacks in n-tier architecture systems, and numerically solve the optimal attack parameters. We adopt a feedback control-theoretic (e.g., Kalman filter) framework that allows attackers to fit the dynamics of background requests or system state by dynamically adjusting attack parameters. To evaluate the practicality of such attacks, we conduct extensive validation through not only analytical, numerical, and simulation results but also real cloud production setting experiments via a representative benchmark website equipped with state-of-the-art DDoS defense tools. We further proposed a solution to detect and defense the proposed attacks, involving three stages: Fine-grained monitoring, identifying bursts, and blocking bots.
Publication Source (Journal or Book title)
Proceedings of the ACM Conference on Computer and Communications Security
First Page
1725
Last Page
1739
Recommended Citation
Shan, H., Wang, Q., & Pu, C. (2017). Tail attacks on web applications. Proceedings of the ACM Conference on Computer and Communications Security, 1725-1739. https://doi.org/10.1145/3133956.3133968