Defending networked resources against floods of unwelcome requests

Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, February 2008.

Bibliographic Details
Main Author: Walfish, Michael Howard
Other Authors: Hari Balakrishnan.
Format: Thesis
Language:eng
Published: Massachusetts Institute of Technology 2008
Subjects:
Online Access:http://hdl.handle.net/1721.1/43054
_version_ 1826206713201557504
author Walfish, Michael Howard
author2 Hari Balakrishnan.
author_facet Hari Balakrishnan.
Walfish, Michael Howard
author_sort Walfish, Michael Howard
collection MIT
description Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, February 2008.
first_indexed 2024-09-23T13:37:24Z
format Thesis
id mit-1721.1/43054
institution Massachusetts Institute of Technology
language eng
last_indexed 2024-09-23T13:37:24Z
publishDate 2008
publisher Massachusetts Institute of Technology
record_format dspace
spelling mit-1721.1/430542019-04-11T01:47:08Z Defending networked resources against floods of unwelcome requests Walfish, Michael Howard Hari Balakrishnan. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Electrical Engineering and Computer Science. Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, February 2008. Includes bibliographical references (p. 172-189). The Internet is afflicted by "unwelcome requests'" defined broadly as spurious claims on scarce resources. For example, the CPU and other resources at a server are targets of denial-of-service (DOS) attacks. Another example is spam (i.e., unsolicited bulk email); here, the resource is human attention. Absent any defense, a very small number of attackers can claim a very large fraction of the scarce resources. Traditional responses identify "bad" requests based on content (for example, spam filters analyze email text and embedded URLs). We argue that such approaches are inherently gameable because motivated attackers can make "bad" requests look "good". Instead, defenses should aim to allocate resources proportionally (so if lo% of the requesters are "bad", they should be limited to lo% of the scarce resources). To meet this goal, we present the design, implementation, analysis, and experimental evaluation of two systems. The first, speak-up, defends servers against application-level denial-of-service by encouraging all clients to automatically send more traffic. The "good" clients can thereby compete equally with the "bad" ones. Experiments with an implementation of speak-up indicate that it allocates a server's resources in rough proportion to clients' upload bandwidths, which is the intended result. The second system, DQE, controls spam with per-sender email quotas. Under DQE, senders attach stamps to emails. Receivers communicate with a well-known, untrusted enforcer to verify that stamps are fresh and to cancel stamps to prevent reuse. The enforcer is distributed over multiple hosts and is designed to tolerate arbitrary faults in these hosts, resist various attacks, and handle hundreds of billions of messages daily (two or three million stamp checks per second). Our experimental results suggest that our implementation can meet these goals with only a few thousand PCs. (cont) The enforcer occupies a novel design point: a set of hosts implement a simple storage abstraction but avoid neighbor maintenance, replica maintenance, and mutual trust. One connection between these systems is that DQE needs a DoS defense-and can use speak-up. We reflect on this connection, on why we apply speak-up to DoS and DQE to spam, and, more generally, on what problems call for which solutions. by Michael Walfish. Ph.D. 2008-11-07T18:56:49Z 2008-11-07T18:56:49Z 2007 2008 Thesis http://hdl.handle.net/1721.1/43054 243860630 eng M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582 189 p. application/pdf Massachusetts Institute of Technology
spellingShingle Electrical Engineering and Computer Science.
Walfish, Michael Howard
Defending networked resources against floods of unwelcome requests
title Defending networked resources against floods of unwelcome requests
title_full Defending networked resources against floods of unwelcome requests
title_fullStr Defending networked resources against floods of unwelcome requests
title_full_unstemmed Defending networked resources against floods of unwelcome requests
title_short Defending networked resources against floods of unwelcome requests
title_sort defending networked resources against floods of unwelcome requests
topic Electrical Engineering and Computer Science.
url http://hdl.handle.net/1721.1/43054
work_keys_str_mv AT walfishmichaelhoward defendingnetworkedresourcesagainstfloodsofunwelcomerequests