DDoS defense by offense

Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, Scott Shenker

Research output: Contribution to journalArticle

Abstract

This paper presents the design, implementation, analysis, and experimental evaluation of speak-up, a defense against application-level distributed denial-of-service (DDoS), in which attackers cripple a server by sending legitimate-looking requests that consume computational resources (e.g., CPU cycles, disk). With speak-up, a victimized server encourages all clients, resources permitting, to automatically send higher volumes of traffic. We suppose that attackers are already using most of their upload bandwidth so cannot react to the encouragement. Good clients, however, have spare upload bandwidth and will react to the encouragement with drastically higher volumes of traffic. The intended outcome of this traffic inflation is that the good clients crowd out the bad ones, thereby capturing a much larger fraction of the server's resources than before. We experiment under various conditions and find that speak-up causes the server to spend resources on a group of clients in rough proportion to their aggregate upload bandwidth. This result makes the defense viable and effective for a class of real attacks.

Original languageEnglish (US)
Pages (from-to)303-314
Number of pages12
JournalComputer Communication Review
Volume36
Issue number4
DOIs
StatePublished - Oct 2006

Keywords

  • Bandwidth
  • Currency
  • DoS attack

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'DDoS defense by offense'. Together they form a unique fingerprint.

  • Cite this

    Walfish, M., Vutukuru, M., Balakrishnan, H., Karger, D., & Shenker, S. (2006). DDoS defense by offense. Computer Communication Review, 36(4), 303-314. https://doi.org/10.1145/1151659.1159948