SaTC: CORE: Small: Hardening Systems Against Low-Rate DDoS Attacks
SaTC:核心:小型:针对低速率 DDoS 攻击的强化系统
基本信息
- 批准号:1815495
- 负责人:
- 金额:$ 50万
- 依托单位:
- 依托单位国家:美国
- 项目类别:Standard Grant
- 财政年份:2018
- 资助国家:美国
- 起止时间:2018-09-01 至 2021-08-31
- 项目状态:已结题
- 来源:
- 关键词:
项目摘要
Low-rate denial-of-service (LRD) attacks deny access to services by depleting some limited resource at the end host or a network device. This makes the device unable to process legitimate clients' traffic. LRD attacks are very challenging to detect and handle at the network level, since they are very low-rate. It makes the attack traffic a needle in a haystack of legitimate traffic. On the other hand, detecting LRD at the application would require changes to many applications, and would only be effective against specific attack variants. All online services are vulnerable to distributed denial-of-service (DDoS) attacks, and LRD attacks are especially challenging to handle today, because they can be launched from smaller botnets and at lower rates than flooding attacks. This project designs and builds an LRD defense, called Leader, which is application-agnostic and can handle both current and future attack variants with the same mechanism. Leader makes all online services robust against LRD attacks by helping the services smartly manage their resources and identify and neutralize misuse attempts. This in turn improves the security of the entire Internet, as well as the security of our critical infrastructure. Where full mitigation is not possible, the planned approach raises the bar for attackers, by forcing them to recruit large botnets. The project will generate lecture modules and practical exercises to be used in current courses and shared publicly. Leader defense builds profiles that describe how external requests, clients, applications and the entire device use system resources. These profiles, called "connection life stages" contain information about the type and the amount of the resource used, the order in which the use occurs and the time that each chunk of resource is being held. Leader compares instantaneous profiles to baseline profiles at connection, client, application and device level to detect denial of service and identify the resources being affected. Leader further uses connection life stages to perform anomaly detection, which is used for attack diagnostics and mitigation. In rare cases when the profiles do not show anomalous use of resources, or cannot attribute it to specific connections or clients, Leader resorts to offline binary analysis of affected applications. This analysis helps understand how code paths in the application use system resources, and identify possible code changes to increase robustness to LRD attacks. Leader's combination of system, network and application-level monitoring of the patterns of resource use, and the accounting of resource usage per each external service request, is a unique, novel feature. Leader defense is implemented as an operating system (OS) module, and thus protects the deploying device against all LRD attacks at the OS and the application level.This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
低率拒绝服务(LRD)攻击通过在最终主机或网络设备上耗尽一些有限的资源来拒绝对服务的访问。这使设备无法处理合法客户的流量。 LRD攻击在网络级别上检测和处理非常具有挑战性,因为它们非常低。它使攻击交通成为合法交通的大麻群中的针头。另一方面,在应用程序中检测LRD将需要更改许多应用程序,并且只能对特定的攻击变体有效。所有在线服务都容易受到分布式拒绝服务(DDOS)的攻击,而LRD攻击尤其具有挑战性,因为它们可以从较小的僵尸网络发射,并且比洪水攻击较低。该项目设计并建立了一个名为Leader的LRD防御,该防御能力不合时宜,可以处理具有相同机制的当前和未来攻击变体。 领导者通过帮助服务智能管理其资源并识别和中和滥用尝试,从而使所有在线服务可抵抗LRD攻击。反过来,这提高了整个Internet的安全性以及我们关键基础架构的安全性。如果不可能进行全面缓解,则计划的方法通过迫使他们招募大型僵尸网络来提高攻击者的标准。该项目将生成讲座模块和实用练习,以在当前课程中使用并公开共享。 Leader Deficent构建了概况,描述了外部请求,客户,应用程序和整个设备使用系统资源的方式。这些概要文件称为“连接生命阶段”,包含有关所使用的资源类型和数量,使用的顺序以及所保留每个资源的时间的信息。领导者将瞬时配置文件与连接,客户端,应用程序和设备级别的基线配置文件进行比较,以检测拒绝服务并确定所影响的资源。领导者进一步使用连接生命阶段来执行异常检测,该检测用于攻击诊断和缓解。在极少数情况下,当配置文件没有显示出对资源的异常使用,或者不能将其归因于特定的连接或客户时,Leader Resorts求助于受影响的应用程序的离线二进制分析。该分析有助于了解应用程序中的代码路径如何使用系统资源,并确定可能的代码更改以增加对LRD攻击的鲁棒性。领导者对资源使用模式的系统,网络和应用程序级别的监视以及每个外部服务请求的资源使用情况的计算是一个独特的新功能。领导者防御是作为操作系统(OS)模块实施的,因此可以保护部署设备免受操作系统和应用程序级别的所有LRD攻击。该奖项反映了NSF的法定任务,并认为值得通过基金会的知识分子优点和更广泛的影响审查标准通过评估来获得支持。
项目成果
期刊论文数量(0)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
数据更新时间:{{ journalArticles.updateTime }}
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Jelena Mirkovic其他文献
Game experience preferences of people with chronic illnesses
慢性病患者的游戏体验偏好
- DOI:
10.1145/3240167.3240237 - 发表时间:
2018 - 期刊:
- 影响因子:0
- 作者:
Stian Jessen;Jelena Mirkovic;Marianne Westeng - 通讯作者:
Marianne Westeng
Similarity-based competition in relative clause production and comprehension
关系从句产生和理解中基于相似性的竞争
- DOI:
10.1016/j.jml.2015.12.007 - 发表时间:
2016 - 期刊:
- 影响因子:4.3
- 作者:
Gina F. Humphreys;Jelena Mirkovic;Silvia P. Gennari - 通讯作者:
Silvia P. Gennari
Diagnostic accuracy of frozen section and patterns of nodal spread in high grade endometrial cancer: a secondary analysis of the SENTOR prospective cohort study
- DOI:
10.1016/s0090-8258(21)00762-9 - 发表时间:
2021-08-01 - 期刊:
- 影响因子:
- 作者:
Zibi Marchocki;Maria Cusimano;Danielle Vicus;Katherine Pulman;Marjan Rouzbahman;Jelena Mirkovic;Matthew Cesari;Manjula Maganti;Aysha Zia;Gabrielle Ene;Sarah Ferguson - 通讯作者:
Sarah Ferguson
Developing Technology to Mobilize Personal Strengths in People with Chronic Illness: Positive Codesign Approach
开发技术来调动慢性病患者的个人优势:积极的协同设计方法
- DOI:
10.2196/10774 - 发表时间:
2018 - 期刊:
- 影响因子:2.2
- 作者:
Jelena Mirkovic;Stian Jessen;Ó. Kristjansdottir;Tonje Krogseth;A. T. Koricho;C. Ruland - 通讯作者:
C. Ruland
Utilizing emerging technologies to promote more efficient face-to-face patient-clinician communication
- DOI:
10.1145/2494091.2497362 - 发表时间:
2013-09 - 期刊:
- 影响因子:0
- 作者:
Jelena Mirkovic - 通讯作者:
Jelena Mirkovic
Jelena Mirkovic的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Jelena Mirkovic', 18)}}的其他基金
Research Infrastructure: Mid-scale RI-1 (M1:IP): SPHERE - Security and Privacy Heterogeneous Environment for Reproducible Experimentation
研究基础设施:中型 RI-1 (M1:IP):SPHERE - 用于可重复实验的安全和隐私异构环境
- 批准号:
2330066 - 财政年份:2023
- 资助金额:
$ 50万 - 项目类别:
Cooperative Agreement
CCRI: NEW: CLASSNET: Community Labeling and Sharing of Security and Networking Test datasets
CCRI:新:CLASSNET:安全和网络测试数据集的社区标签和共享
- 批准号:
2120400 - 财政年份:2021
- 资助金额:
$ 50万 - 项目类别:
Standard Grant
REU Site: SURF-I: Safe, Usable, Resilient and Fair Internet
REU 网站:SURF-I:安全、可用、有弹性和公平的互联网
- 批准号:
2051101 - 财政年份:2021
- 资助金额:
$ 50万 - 项目类别:
Standard Grant
CCRI: ENS: Modernizing and Streamlining DeterLab Testbed Experimentation
CCRI:ENS:现代化和简化 DeterLab 测试床实验
- 批准号:
2016643 - 财政年份:2020
- 资助金额:
$ 50万 - 项目类别:
Standard Grant
Elements: Software: Distributed Workflows for Cyberexperimentation
要素:软件:网络实验的分布式工作流程
- 批准号:
1835608 - 财政年份:2018
- 资助金额:
$ 50万 - 项目类别:
Standard Grant
REU Site: Human Communication in a Connected World
REU 网站:互联世界中的人类沟通
- 批准号:
1659886 - 财政年份:2017
- 资助金额:
$ 50万 - 项目类别:
Standard Grant
Collaborative Research: Modeling Student Activity and Learning on Cybersecurity Testbeds
协作研究:在网络安全测试平台上对学生活动和学习进行建模
- 批准号:
1723717 - 财政年份:2017
- 资助金额:
$ 50万 - 项目类别:
Standard Grant
EDU: Revitalizing Cyber Security Education and Research through Competitions
EDU:通过竞赛振兴网络安全教育和研究
- 批准号:
1319197 - 财政年份:2014
- 资助金额:
$ 50万 - 项目类别:
Standard Grant
TWC: Option: Small: FRADE: Model Human Behavior for Flash cRowd Attack DEfense
TWC:选项:小:FRADE:Flash cRowd 攻击防御的人类行为模型
- 批准号:
1319215 - 财政年份:2013
- 资助金额:
$ 50万 - 项目类别:
Standard Grant
TWC: Small: Critter@home: Content-Rich Traffic Trace Repository from Real-Time, Anonymous, User Contributions
TWC:小型:Critter@home:来自实时、匿名、用户贡献的内容丰富的流量跟踪存储库
- 批准号:
1224035 - 财政年份:2012
- 资助金额:
$ 50万 - 项目类别:
Standard Grant
相似国自然基金
基于NRF2调控KPNB1促进PD-L1核转位介导非小细胞肺癌免疫治疗耐药的机制研究
- 批准号:82303969
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
小胶质细胞调控外侧隔核-腹侧被盖区神经环路介导社交奖赏障碍的机制研究
- 批准号:82304474
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
肾去交感神经术促进下丘脑室旁核小胶质细胞M2型极化减轻心衰损伤的机制研究
- 批准号:82370387
- 批准年份:2023
- 资助金额:49 万元
- 项目类别:面上项目
空间邻近标记技术研究莱茵衣藻蛋白核小管与碳浓缩机制的潜在关系
- 批准号:32300220
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
polyG蛋白聚集体诱导小胶质细胞活化在神经元核内包涵体病中的作用及机制研究
- 批准号:82301603
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
相似海外基金
SaTC: CORE: Small: An evaluation framework and methodology to streamline Hardware Performance Counters as the next-generation malware detection system
SaTC:核心:小型:简化硬件性能计数器作为下一代恶意软件检测系统的评估框架和方法
- 批准号:
2327427 - 财政年份:2024
- 资助金额:
$ 50万 - 项目类别:
Continuing Grant
Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
- 批准号:
2338301 - 财政年份:2024
- 资助金额:
$ 50万 - 项目类别:
Continuing Grant
Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
- 批准号:
2338302 - 财政年份:2024
- 资助金额:
$ 50万 - 项目类别:
Continuing Grant
SaTC: CORE: Small: NSF-DST: Understanding Network Structure and Communication for Supporting Information Authenticity
SaTC:核心:小型:NSF-DST:了解支持信息真实性的网络结构和通信
- 批准号:
2343387 - 财政年份:2024
- 资助金额:
$ 50万 - 项目类别:
Standard Grant
NSF-NSERC: SaTC: CORE: Small: Managing Risks of AI-generated Code in the Software Supply Chain
NSF-NSERC:SaTC:核心:小型:管理软件供应链中人工智能生成代码的风险
- 批准号:
2341206 - 财政年份:2024
- 资助金额:
$ 50万 - 项目类别:
Standard Grant