ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks
Cited 6 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Hyunjoo Kim, Byoungkoo Kim, Daewon Kim, Ik-Kyun Kim, Tai-Myoung Chung
Issue Date
2012-08
Citation
International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.285-295
Publisher
Springer
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1007/978-3-642-35416-8_20
Abstract
Distributed Denial-of-Service (DDoS) attacks are made in such a way that a plurality of zombie computers infected with malicious code simultaneously makes Denial-of-Service (DoS) attacks. These DDoS attacks still dominate the ranking of cyber threats. It is a great challenge to accurately detect and intercept the DDoS attacks on high speed network. Most of all, HTTP GET flooding attacks increase day by day. Therefore, we propose the web server protection scheme against HTTP GET flooding attacks. The proposed technique easily can detect HTTP GET flooding attacks. Most of all, it was implemented in our Gigabit Ethernet Secure Network Interface Controller (GESNIC) for the high performance DDoS prevention. Our GESNIC let IT administrators protect their Internet servers against various DDoS attacks. GESNIC provides the high performance secure logics, which is a kind of security offload engine against TCP and HTTP related DDoS attacks on network interface card. Besides, the secure offload engine has robustness against various DDoS attacks itself and it is independent on server's OS and external network configuration. Its performance is almost a carrier-class level as latency time of 7x10?닋6 seconds. In summary, installing our GES-NIC can make the more secure, highly available, and easier to manage -which is exactly the kind of innovation.
KSP Keywords
Cyber threats, DDoS attacks, Denial-of-service (DoS) attacks, Distributed denial-of-service(DDoS), External Network, HTTP GET flooding, High performance, High-speed networks, Internet servers, Latency time, Malicious code