Practical and accurate runtime application protection against dos attacks

M Elsabagh, D Fleck, A Stavrou, M Kaplan… - … Symposium on Research …, 2017 - Springer
Abstract Software Denial-of-Service (DoS) attacks use maliciously crafted inputs aiming to
exhaust available resources of the target software. These application-level DoS attacks have …

Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications

R Tandon, H Wang, N Weideman, S Arakelyan… - Proceedings of the 26th …, 2023 - dl.acm.org
Exploit-based denial-of-service attacks (exDoS) are challenging to detect and mitigate.
Rather than flooding the network with excessive traffic, these attacks generate low rates of …

Coda: Runtime Detection of Application-Layer CPU-Exhaustion DoS Attacks in Containers

M Zhan, Y Li, H Yang, G Yu, B Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Denial of service (DoS) attacks have increasingly exploited vulnerabilities in algorithms or
implementation methods in application-layer programs. In this type of attack, called CPU …

On early detection of application-level resource exhaustion and starvation

M Elsabagh, D Barbará, D Fleck, A Stavrou - Journal of Systems and …, 2018 - Elsevier
Software systems are often engineered and tested for functionality under normal rather than
worst-case conditions. This makes the systems vulnerable to denial-of-service attacks …

Defense techniques for low-rate DoS attacks against application servers

G Maciá-Fernández, RA Rodríguez-Gómez… - Computer Networks, 2010 - Elsevier
Low-rate denial of service (DoS) attacks have recently emerged as new strategies for
denying networking services. Such attacks are capable of discovering vulnerabilities in …

Radmin: early detection of application-level resource exhaustion and starvation attacks

M Elsabagh, D Barbará, D Fleck, A Stavrou - Research in Attacks …, 2015 - Springer
Software systems are often engineered and tested for functionality under normal rather than
worst-case conditions. This makes the systems vulnerable to denial of service attacks, where …

Detecting Asymmetric Application-layer {Denial-of-Service} Attacks {In-Flight} with {FineLame}

HM Demoulin, I Pedisich, N Vasilakis, V Liu… - 2019 USENIX Annual …, 2019 - usenix.org
Denial of service (DoS) attacks increasingly exploit algorithmic, semantic, or implementation
characteristics dormant in victim applications, often with minimal attacker resources …

Rampart: Protecting Web Applications from {CPU-Exhaustion}{Denial-of-Service} Attacks

W Meng, C Qian, S Hao, K Borgolte, G Vigna… - 27th USENIX Security …, 2018 - usenix.org
Denial-of-Service (DoS) attacks pose a severe threat to the availability of web applications.
Traditionally, attackers have employed botnets or amplification techniques to send a …

Microservices made attack-resilient using unsupervised service fissioning

AF Baarzi, G Kesidis, D Fleck, A Stavrou - Proceedings of the 13th …, 2020 - dl.acm.org
Application-layer DoS attacks are increasing as the number of cloud-deployed microservice
applications is increasing. The attacker tries to exhaust computing resources and brings the …

The impact of application-layer denial-of-service attacks

H Gonzalez, MA Gosselin-Lavigne… - Case Studies in …, 2014 - api.taylorfrancis.com
The frequency and power of denial-of-service (DoS) attacks have marked the first quarter of
2013 as the worst quarter for DoS attacks in history, averaging a 58% increase compared to …