Increasing DoS-Resilience for Cross-Protocol Proxies
Industry is reporting increasingly damaging and popular application layer Denialof-Service (DoS) attacks. Therefore, now more than ever before, it is important to develop mitigations to DoS attacks generally, and application layer DoS attacks in particular. The challenge of this work is that applica...
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis |
Published: |
Massachusetts Institute of Technology
2023
|
Online Access: | https://hdl.handle.net/1721.1/147308 |
_version_ | 1826206749560930304 |
---|---|
author | Farhat, Amir |
author2 | Sollins, Karen R. |
author_facet | Sollins, Karen R. Farhat, Amir |
author_sort | Farhat, Amir |
collection | MIT |
description | Industry is reporting increasingly damaging and popular application layer Denialof-Service (DoS) attacks. Therefore, now more than ever before, it is important to develop mitigations to DoS attacks generally, and application layer DoS attacks in particular. The challenge of this work is that application layer Internet-of-Things (IoT) systems integrated with cloud services exhibit a distinctive DoS vulnerability. The cloud services are accessed using HTTPS, but typically the small, under-resourced IoT devices only have the capacity to support the simplified, HTTP(S)-like CoAP(S) protocol, requiring protocol translation to occur in a proxy somewhere. This project addresses questions about how to reduce the vulnerability of such a proxy to DoS attacks. The contributions of this work are twofold. Firstly, we provide meaningful conclusions about the DoS-resilience of configuration parameters and compare our optimal settings with the defaults of the most substantial and widely used open source implementation of the CoAP(S) protocol proxy and auxiliary utilities. Our optimal settings result in substantial resilience against DoS attacks. Specifically, we cut mean client response time by two thirds, increase the number of messages that clients send successfully to 3.6x, reduce proxy memory usage by 20%, and reduce proxy CPU utilization in half. We additionally provide an architectural design proposal for the proxy which is likely to drastically increase its ability to maintain good performance for clients during an attack. Secondly, running experiments on DeterLab presents challenges regarding the collection and handling of experiment results without impinging on the performance of the experiments themselves. We provide our findings on solving the issues of impingement-free data collection and experiment storage and analysis in the form of an experiment management toolkit. To conclude, the research both demonstrates a viable reconfiguration of the proxy to simultaneously improve performance and reduce vulnerability to DoS attacks, and demonstrates the effectiveness of the experiment management toolkit developed during our research. |
first_indexed | 2024-09-23T13:37:40Z |
format | Thesis |
id | mit-1721.1/147308 |
institution | Massachusetts Institute of Technology |
last_indexed | 2024-09-23T13:37:40Z |
publishDate | 2023 |
publisher | Massachusetts Institute of Technology |
record_format | dspace |
spelling | mit-1721.1/1473082023-01-20T03:27:34Z Increasing DoS-Resilience for Cross-Protocol Proxies Farhat, Amir Sollins, Karen R. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science Industry is reporting increasingly damaging and popular application layer Denialof-Service (DoS) attacks. Therefore, now more than ever before, it is important to develop mitigations to DoS attacks generally, and application layer DoS attacks in particular. The challenge of this work is that application layer Internet-of-Things (IoT) systems integrated with cloud services exhibit a distinctive DoS vulnerability. The cloud services are accessed using HTTPS, but typically the small, under-resourced IoT devices only have the capacity to support the simplified, HTTP(S)-like CoAP(S) protocol, requiring protocol translation to occur in a proxy somewhere. This project addresses questions about how to reduce the vulnerability of such a proxy to DoS attacks. The contributions of this work are twofold. Firstly, we provide meaningful conclusions about the DoS-resilience of configuration parameters and compare our optimal settings with the defaults of the most substantial and widely used open source implementation of the CoAP(S) protocol proxy and auxiliary utilities. Our optimal settings result in substantial resilience against DoS attacks. Specifically, we cut mean client response time by two thirds, increase the number of messages that clients send successfully to 3.6x, reduce proxy memory usage by 20%, and reduce proxy CPU utilization in half. We additionally provide an architectural design proposal for the proxy which is likely to drastically increase its ability to maintain good performance for clients during an attack. Secondly, running experiments on DeterLab presents challenges regarding the collection and handling of experiment results without impinging on the performance of the experiments themselves. We provide our findings on solving the issues of impingement-free data collection and experiment storage and analysis in the form of an experiment management toolkit. To conclude, the research both demonstrates a viable reconfiguration of the proxy to simultaneously improve performance and reduce vulnerability to DoS attacks, and demonstrates the effectiveness of the experiment management toolkit developed during our research. M.Eng. 2023-01-19T18:44:31Z 2023-01-19T18:44:31Z 2022-09 2022-09-16T20:24:07.817Z Thesis https://hdl.handle.net/1721.1/147308 In Copyright - Educational Use Permitted Copyright MIT http://rightsstatements.org/page/InC-EDU/1.0/ application/pdf Massachusetts Institute of Technology |
spellingShingle | Farhat, Amir Increasing DoS-Resilience for Cross-Protocol Proxies |
title | Increasing DoS-Resilience for Cross-Protocol Proxies |
title_full | Increasing DoS-Resilience for Cross-Protocol Proxies |
title_fullStr | Increasing DoS-Resilience for Cross-Protocol Proxies |
title_full_unstemmed | Increasing DoS-Resilience for Cross-Protocol Proxies |
title_short | Increasing DoS-Resilience for Cross-Protocol Proxies |
title_sort | increasing dos resilience for cross protocol proxies |
url | https://hdl.handle.net/1721.1/147308 |
work_keys_str_mv | AT farhatamir increasingdosresilienceforcrossprotocolproxies |