CSC 774 -- Network Security - Dr. Peng Ning
CSC 774 -- Network Security - Dr. Peng Ning
CSC 774 -- Network Security - Dr. Peng Ning
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Resource Clogging Attack<br />
Busy<br />
computing<br />
Many bogus requests<br />
With false source IPs<br />
• Stopping requests is difficult<br />
– We need to provide services.<br />
• Ignoring requests is dangerous<br />
– Denial of service attacks<br />
Computer Science<br />
<strong>Dr</strong>. <strong>Peng</strong> <strong>Ning</strong> <strong>CSC</strong> <strong>774</strong> <strong>Network</strong> <strong>Security</strong> 19<br />
Resource Clogging Attack (Cont’d)<br />
• Counter measure<br />
– If we cannot stop bogus requests, at least we<br />
should know from where the requests are sent.<br />
– Cookies are used to thwart resource clogging<br />
attack<br />
• Thwart, not prevent<br />
Computer Science<br />
<strong>Dr</strong>. <strong>Peng</strong> <strong>Ning</strong> <strong>CSC</strong> <strong>774</strong> <strong>Network</strong> <strong>Security</strong> 20