so our DDoS protector keeps the CPU utilization rate below 75% under attack. We
can keep the CPU utilization rate below 60% after starting up the authentication
mechanism.
5 Conclusions
The defense mechanism of DDoS attacks, particularly the multi-based,
multi-approached and diversified flow method of offensive artifice, simulating the
competition of legal users, inhabits a keystone and difficulty in the internet security
arena, especially for the mini websites. This dissertation discusses and implements the
Counter HTTP DDoS Attacks based on Weighted Queue Random Early Drop.
Our mechanism is characteristically distinct from current methods:
(1) Utilizes few resources and does not require participation from other routers. In
general, requires nothing from the internet or the management services of ISP.
(2) Allows for simple and convenient updating of the Turing test. A few shares of
restriction codes as well as the amendment of protocol stacks are the only renovations
needed for withstanding DDoS without any negative impact on the clients.
(3) Optimize the web flow. Enhance the server’s efficiency by precluding and
dismissing the overall current abruptness of ordinary flow,
All in all, allocating the server’s resources to both the validation and service
components with more efficiency, and applying the Turing test to larger websites for
DDoS defense are voids we are seeking to fill in this sector of internet security.
References
1. Jelena Mirkovic, Sven Dietrich, Internet Denial of Service: Attack and Defense
Mechanisms, Prentice Hall PTR, December 30, 2004,1-400
2. Siris VA, Application of anomaly detection algorithms for detecting SYN flooding attacks
In: Regency H, ed. Global Telecommunications Conf. (GLOBECOM 2004). Dallas: IEEE,
2004. 2050-2054.
3. Li W, Wu LF, Hu GY. Design and implementation of distributed intrusion detection system
NetNumen. Journal of Software, 2002,13(8):1723-1728
4. Sung M, Xu J. IP traceback-based intelligent packet filtering: A novel technique for
defending against Internet DDoS attacks. IEEE Trans. on Parallel and Distributed Systems,
2003, 14(9):861-872.
5. A. Chandra and P. Shenoy. Effectiveness of dynamic resource allocation for handling
Internet, University of Massachussets, TR03-37, 2003.
6. Liang F, Yau D. Using adaptive router throttles against distributed denial-of-service attacks.
Journal of Software, 2002,13(7): 1120-1127
7. Morein, W.G., Stavrou, A., Cook, D.L., Keromytis, A.D., Misra, V., Rubenstein, D.: Using
Graphic Turing Tests to Counter Automated DDoS Attacks Against Web Servers. In:
Proceedings of the 10th ACM International Conference on Computer and Communications
Security (CCS). (2003) 8-19.
8. S. Kandula, D. Katabi, M. Jacob, and A. Berger. Botz-4-sale:Surviving organized DDoS
attacks that mimic flash crowds. In USENIX NSDI, May 2005.
80