Please use this identifier to cite or link to this item:
https://scholarbank.nus.edu.sg/handle/10635/41704
DC Field | Value | |
---|---|---|
dc.title | Effect of malicious synchronization | |
dc.contributor.author | Chan, M.C. | |
dc.contributor.author | Chang, E.-C. | |
dc.contributor.author | Lu, L. | |
dc.contributor.author | Ngiam, P.S. | |
dc.date.accessioned | 2013-07-04T08:33:45Z | |
dc.date.available | 2013-07-04T08:33:45Z | |
dc.date.issued | 2006 | |
dc.identifier.citation | Chan, M.C., Chang, E.-C., Lu, L., Ngiam, P.S. (2006). Effect of malicious synchronization. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 3989 LNCS : 114-129. ScholarBank@NUS Repository. | |
dc.identifier.isbn | 3540347038 | |
dc.identifier.issn | 03029743 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/41704 | |
dc.description.abstract | We study the impact of malicipus synchronization on computer systems that serve customers periodically. Systems supporting automatic periodic updates are common in web servers providing regular news update, sports scores or stock quotes. Our study focuses on the possibility of launching an effective low rate attack on the server to degrade performance measured in terms of longer processing time and request drops due to timeouts. The attackers are assumed to behave like normal users and send one request per update cycle. The only parameter utilized in the attack is the timing of the requests sent. By exploiting the periodic nature of the updates, a small number of attackers can herd users' update requests to a cluster and arrive in a short period of time. Herding can be used to discourage new users from joining the system and to modify the user arrival distribution, so that the subsequent burst attack will be effective. While the herding based attacks can be launched with a small amount of resource, they can be easily prevented by adding a small random component to the length of the update interval. © Springer-Verlag Berlin Heidelberg 2006. | |
dc.source | Scopus | |
dc.subject | Distributed Denial of Service (DDoS) attacks | |
dc.subject | Herding | |
dc.subject | Low rate DDoS attack | |
dc.subject | Network security | |
dc.subject | Periodicity | |
dc.subject | Synchronization | |
dc.type | Conference Paper | |
dc.contributor.department | COMPUTATIONAL SCIENCE | |
dc.description.sourcetitle | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | |
dc.description.volume | 3989 LNCS | |
dc.description.page | 114-129 | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.