An emulation based impact analysis of DDoS attacks on web services during flash events

Author(s):  
Monika Sachdeva ◽  
Gurvinder Singh ◽  
Krishan Kumar
Author(s):  
Salahdine Hachimi ◽  
Noura Faci ◽  
Zakaria Maamar

Web services substitution is a promising solution that enables process continuity of SOA-based applications associated with composite Web services (WSs). This chapter proposes an approach that assesses the impact of substitution on the composition and selects the best substitute, from a pool of substitutes, in order to reduce potential conflicts due to different ontologies with other peers in this composition, for example. Two types of impact along with their assessment metrics are defined: local (semantic/policy compatibility matching degree) and global (QoS satisfaction degree). This chapter addresses the selection issue as an optimization problem whose main objective is to minimize the efforts to put into resuming the ongoing composition under some temporal constraints. A set of experiments are conducted as a proof of concept and the findings show that our approach provides the necessary means for achieving Web services substitution with minimal disruption time.


Author(s):  
Georg Disterer ◽  
Ame Alles ◽  
Axel Hervatin

Since denial-of-service (DoS) attacks are a major threat to e-commerce, waves of DoS attacks against prominent Web pages gained wide publicity. Typically DoS attacks target Web sites with bogus requests for data in order to slow or block legitimate users from accessing services. In recent years, distributed denial-of-service (DDoS) attacks have been used, which expand the vulnerability of Web sites. Attackers use hundreds or thousands of compromised systems in order to harm commercial Web sites. Attackers use different ways to harm their victims. They manipulate the target networks or target server servers directly by using lacks of protocols and standards to force failures and shut-downs. Or, they try to deplete resources like bandwidth, memory, or processing capacities. Attackers try to hinder or interfere with legitimate users with both strategies. Damages from DDoS attacks can range from inconvenience for legitimate users and customers to a lack of reliability for the site and—finally—to a shutdown of the server and some delay until web services are continued. This is a severe threat for all companies involved in e-commerce, and managing that risk is important to offer secure and reliable services. Therefore, management must take actions of prevention, detection and mitigation in order to protect their Web services.


Author(s):  
Manish Kumar ◽  
Abhinav Bhandari

As the world is getting increasingly dependent on the Internet, the availability of web services has been a key concern for various organizations. Application Layer DDoS (AL-DDoS) attacks may hamper the availability of web services to the legitimate users by flooding the request queue of the web server. Hence, it is pertinent to focus fundamentally on studying the queue scheduling policies of web server against the HTTP request flooding attack which has been the base of this research work. In this paper, the various types of AL-DDoS attacks launched by exploiting the HTTP protocol have been reviewed. The key aim is to compare the requests queue scheduling policies of web server against HTTP request flooding attack using NS2 simulator. Various simulation scenarios have been presented for comparison, and it has been established that queue scheduling policy can be a significant role player in tolerating the AL-DDoS attacks.


2017 ◽  
Vol 11 (4) ◽  
pp. 29-46
Author(s):  
Manish Kumar ◽  
Abhinav Bhandari

As the world is getting increasingly dependent on the Internet, the availability of web services has been a key concern for various organizations. Application Layer DDoS (AL-DDoS) attacks may hamper the availability of web services to the legitimate users by flooding the request queue of the web server. Hence, it is pertinent to focus fundamentally on studying the queue scheduling policies of web server against the HTTP request flooding attack which has been the base of this research work. In this paper, the various types of AL-DDoS attacks launched by exploiting the HTTP protocol have been reviewed. The key aim is to compare the requests queue scheduling policies of web server against HTTP request flooding attack using NS2 simulator. Various simulation scenarios have been presented for comparison, and it has been established that queue scheduling policy can be a significant role player in tolerating the AL-DDoS attacks.


2014 ◽  
Vol 16 (6) ◽  
pp. 24-33
Author(s):  
Mrs.S Thilagavathi ◽  
◽  
Dr.A Saradha
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document