skip to main content
10.1145/1036921.1036928acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Attack resistant cache replacement for survivable services

Published:31 October 2003Publication History

ABSTRACT

Many distributed services are susceptible to attacks by malicious clients that can significantly degrade their performance. Scalable distributed services make use of a variety of techniques which are vulnerable to such attacks. We explore the survivability of services when attacks target the scalability techniques employed by the services. In particular, we explore how the effectiveness of caching can be degraded when malicious clients manipulate cache management algorithms. We present an attack resistant replacement algorithm and show that it is much more effective in dealing with attacks compared to other widely deployed replacement algorithms.

References

  1. Edward G. Coffman Jr., and Peter J. Denning, "Operating Systems Theory", Prentice-Hall, Inc., 1973. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Susanne Albers, "Competitive Online Algorithms", ISSN 1395-2048 BRICS lecture series, 1996.Google ScholarGoogle Scholar
  3. Paolo Lorenzetti, Luigi Rizzo, and Lorenzo Vicisano, "Replacement Policies For A Proxy Cache", IEEE/ACM Transactions on networking, 1998.Google ScholarGoogle Scholar
  4. Boeing proxy logs. http://www.web-caching.com/traces-logs.htmlGoogle ScholarGoogle Scholar
  5. Carlos R. Cunha, Azer Bestavros, and Mark E. Crovella "Characteristics of WWW Client-based Traces", Technical Report BU-CS-95-010, Boston University Computer Science Department, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Squid Web Proxy Cache, http://www.squid-cache.org.Google ScholarGoogle Scholar
  7. IRCACHE - the NLANR Web Caching Project, http://www.ircache.netGoogle ScholarGoogle Scholar
  8. Jun Xu, "Sustaining Availability Of Web Services Under Severe Denial Of Service Attacks", Technical Report GIT-CC-01-10, 2001.Google ScholarGoogle Scholar
  9. David Moore, Geoffrey M. Voelker, and Stefan Savage, "Inferring Internet Denial Of Service Activity", Proceedings of the 2001 USENIX security symposium, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Denial of Service (DOS) Attack Resources, http://www.denialinfo.com.Google ScholarGoogle Scholar
  11. Martin F. Arlitt, and Carey L. Williamson, "Trace Driven Simulation of Document Caching Strategies for Internet Web Servers", The Society for Computer Simulation SIMULATION Journal, Jan. 1997.Google ScholarGoogle ScholarCross RefCross Ref
  12. Peng Liu and Lunquan Li, "A Game Theoretic Approach to Attack Prediction", Technical Report, PSU-S2-2002-01, Penn State University, 2002.Google ScholarGoogle Scholar
  13. Evangelos P. Markatos, "Main Memory Caching Of Web Documents", Proceedings of the Fifth International WWW Conference, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Economics and Statistics Administration, U.S. Department of Commerce "Digital Economy 2000" June 2000.Google ScholarGoogle Scholar
  15. D.J. Bernstein, and Eric Schenk, "SYN Cookies Firewall Project", http://www.bronzesoft.org/projects/scfw.Google ScholarGoogle Scholar
  16. X. Axelsson, "Research in Intrusion Detection Systems: A survey", TR 98-17, Chalmers University, Sweden, 1999.Google ScholarGoogle Scholar
  17. Elizabeth J. O'Neil, Patrick E. O'Neil and Gerhard Weikum, "The LRU-K Page Replacement Algorithm for Database Disk Buffering", Proc. ACM SIGMOD, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. N. Megiddo and D. S. Modha, "ARC: A Self-tuning, Low Overhead Replacement Cache", Proc. 2nd Usenix Conference on File and Storage Technologies (FAST 03), 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A.Sundaram, "An introduction to intrusion detection", ACM Crossroads 2.4 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson, "Practical Network Support for IP Traceback", Proceedings of ACM SIGCOMM 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Frank Kargl, and Joern Maier, "Protecting Web Servers from Distributed Denial of Service Attacks", Tenth International World Wide Web Conference, May 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Evangelos P. Markatos, "Main Memory Caching of Web Documents", Computer Networks and ISDN Systems, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Azer Bestavros et. al., "Application-Level Document Caching in the Internet", Proceedings of the IEEE SDNE 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Attack resistant cache replacement for survivable services

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SSRS '03: Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
      October 2003
      129 pages
      ISBN:1581137842
      DOI:10.1145/1036921

      Copyright © 2003 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 31 October 2003

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader