30.01.2015 Views

CSC 774 -- Network Security - Dr. Peng Ning

CSC 774 -- Network Security - Dr. Peng Ning

CSC 774 -- Network Security - Dr. Peng Ning

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Resource Clogging Attack<br />

Busy<br />

computing<br />

Many bogus requests<br />

With false source IPs<br />

• Stopping requests is difficult<br />

– We need to provide services.<br />

• Ignoring requests is dangerous<br />

– Denial of service attacks<br />

Computer Science<br />

<strong>Dr</strong>. <strong>Peng</strong> <strong>Ning</strong> <strong>CSC</strong> <strong>774</strong> <strong>Network</strong> <strong>Security</strong> 19<br />

Resource Clogging Attack (Cont’d)<br />

• Counter measure<br />

– If we cannot stop bogus requests, at least we<br />

should know from where the requests are sent.<br />

– Cookies are used to thwart resource clogging<br />

attack<br />

• Thwart, not prevent<br />

Computer Science<br />

<strong>Dr</strong>. <strong>Peng</strong> <strong>Ning</strong> <strong>CSC</strong> <strong>774</strong> <strong>Network</strong> <strong>Security</strong> 20

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!