File Download
Links for fulltext
(May Require Subscription)
- Scopus: eid_2-s2.0-85056837914
- WOS: WOS:000485139900024
Supplementary
- Citations:
- Appears in Collections:
Conference Paper: Rampart: Protecting web applications from CPU-exhaustion denial-of-service attacks
Title | Rampart: Protecting web applications from CPU-exhaustion denial-of-service attacks |
---|---|
Authors | |
Issue Date | 2018 |
Citation | The 27th USENIX Security Symposium, Baltimore, MD, 15-17 August 2018. In Proceedings of the 27th USENIX Security Symposium, 2018, p. 393-410 How to Cite? |
Abstract | Denial-of-Service (DoS) attacks pose a severe threat to the availability of web applications. Traditionally, attackers have employed botnets or amplification techniques to send a significant amount of requests to exhaust a target web server's resources, and, consequently, prevent it from responding to legitimate requests. However, more recently, highly sophisticated DoS attacks have emerged, in which a single, carefully crafted request results in significant resource consumption and ties up a web application's back-end components for a non-negligible amount of time. Unfortunately, these attacks require only few requests to overwhelm an application, which makes them difficult to detect by state-of-the-art detection systems. In this paper, we present Rampart, which is a defense that protects web applications from sophisticated CPU-exhaustion DoS attacks. Rampart detects and stops sophisticated CPU-exhaustion DoS attacks using statistical methods and function-level program profiling. Furthermore, it synthesizes and deploys filters to block subsequent attacks, and it adaptively updates them to minimize any potentially negative impact on legitimate users. We implemented Rampart as an extension to the PHP Zend engine. Rampart has negligible performance overhead and it can be deployed for any PHP application without having to modify the application's source code. To evaluate Rampart's effectiveness and efficiency, we demonstrate that it protects two of the most popular web applications, WordPress and Drupal, from real-world and synthetic CPU-exhaustion DoS attacks, and we also show that Rampart preserves web server performance with low false positive rate and low false negative rate. |
Persistent Identifier | http://hdl.handle.net/10722/303870 |
ISBN | |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mengt, Wei | - |
dc.contributor.author | Qian, Chenxiong | - |
dc.contributor.author | Hao, Shuang | - |
dc.contributor.author | Borgolte, Kevin | - |
dc.contributor.author | Vigna, Giovanni | - |
dc.contributor.author | Kruegel, Christopher | - |
dc.contributor.author | Lee, Wenke | - |
dc.date.accessioned | 2021-09-15T08:26:11Z | - |
dc.date.available | 2021-09-15T08:26:11Z | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | The 27th USENIX Security Symposium, Baltimore, MD, 15-17 August 2018. In Proceedings of the 27th USENIX Security Symposium, 2018, p. 393-410 | - |
dc.identifier.isbn | 9781939133045 | - |
dc.identifier.uri | http://hdl.handle.net/10722/303870 | - |
dc.description.abstract | Denial-of-Service (DoS) attacks pose a severe threat to the availability of web applications. Traditionally, attackers have employed botnets or amplification techniques to send a significant amount of requests to exhaust a target web server's resources, and, consequently, prevent it from responding to legitimate requests. However, more recently, highly sophisticated DoS attacks have emerged, in which a single, carefully crafted request results in significant resource consumption and ties up a web application's back-end components for a non-negligible amount of time. Unfortunately, these attacks require only few requests to overwhelm an application, which makes them difficult to detect by state-of-the-art detection systems. In this paper, we present Rampart, which is a defense that protects web applications from sophisticated CPU-exhaustion DoS attacks. Rampart detects and stops sophisticated CPU-exhaustion DoS attacks using statistical methods and function-level program profiling. Furthermore, it synthesizes and deploys filters to block subsequent attacks, and it adaptively updates them to minimize any potentially negative impact on legitimate users. We implemented Rampart as an extension to the PHP Zend engine. Rampart has negligible performance overhead and it can be deployed for any PHP application without having to modify the application's source code. To evaluate Rampart's effectiveness and efficiency, we demonstrate that it protects two of the most popular web applications, WordPress and Drupal, from real-world and synthetic CPU-exhaustion DoS attacks, and we also show that Rampart preserves web server performance with low false positive rate and low false negative rate. | - |
dc.language | eng | - |
dc.relation.ispartof | Proceedings of the 27th USENIX Security Symposium | - |
dc.title | Rampart: Protecting web applications from CPU-exhaustion denial-of-service attacks | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_OA_fulltext | - |
dc.identifier.scopus | eid_2-s2.0-85056837914 | - |
dc.identifier.spage | 393 | - |
dc.identifier.epage | 410 | - |
dc.identifier.isi | WOS:000485139900024 | - |