Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks

نویسندگان

  • Mohamed Elsabagh
  • Daniel Barbará
  • Daniel Fleck
  • Angelos Stavrou
چکیده

Software systems are often engineered and tested for functionality under normal rather than worst-case conditions. This makes the systems vulnerable to denial of service attacks, where attackers engineer conditions that result in overconsumption of resources or starvation and stalling of execution. While the security community is well familiar with volumetric resource exhaustion attacks at the network and transport layers, application-specific attacks pose a challenging threat. In this paper, we present Radmin, a novel system for early detection of applicationlevel resource exhaustion and starvation attacks. Radmin works directly on compiled binaries. It learns and executes multiple probabilistic finite automata from benign runs of target programs. Radmin confines the resource usage of target programs to the learned automata, and detects resource usage anomalies at their early stages. We demonstrate the effectiveness of Radmin by testing it over a variety of resource exhaustion and starvation weaknesses on commodity off-the-shelf software.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practical and Accurate Runtime Application Protection Against DoS Attacks

Software Denial-of-Service (DoS) attacks use maliciously crafted inputs aiming to exhaust available resources of the target software. These application-level DoS attacks have become even more prevalent due to the increasing code complexity and modular nature of Internet services that are deployed in cloud environments, where resources are shared and not always guaranteed. To make matters worse,...

متن کامل

TCP/IP Data Normalization

Defending networks against today's attackers is especially challenging for modern intrusion detection/prevention systems for two reasons: the sheer amount of state they must maintain, and the possibility of resource exhaustion attacks on the defense system itself. Our work shows how to cope with these challenges in the context of a TCP stream normalizer whose job is to detect all instances of i...

متن کامل

Discrete R-Contiguous bit Matching mechanism appropriateness for anomaly detection in Wireless Sensor Networks

Resource exhaustion is one of the main challenges for the security of Wireless Sensor Networks (WSNs). The challenge can be addressed by using algorithms that are light weighted. In this paper use of light-weighted RContiguous Bit matching for attack detection in WSNs has been evaluated. Use of R-Contiguous bit matching in Negative Selection Algorithm (NSA) has improved the performance of anoma...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Cell fasting: Cellular response and application of serum starvation

  Humans suffer transient or persistent starvation due to a lack of food intake, either because of fasting, voluntary dieting, or due to the scarcity of available food. At the cellular level it is possible to possess pathological starvation during ischemia and solid tumors. Blood provides many nutrients to our cells, and researchers provide these nutrients to cells in culture in the form of en...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015