Abstract
This paper describes a toolkit to help improve the robustness of code against DoS attacks. We observe that when developing software, programmers primarily focus on functionality. Protecting code from attacks is often considered the responsibility of the 0S, firewalls and intrusion detection systems. As a result, many DoS vulnerabilities are not discovered until the system is attacked and the damage is done. Instead of reacting to attacks after the fact, this paper argues that a better solution is to make software defensive by systematically injecting protection mechanisnls into the code itself. Our toolkit provides an API that programmers use to annotate their code. At runtime, these annotations serve as both sensors and actuators: watching for resource abuse and taking the appropriate action should abuse be detected. This paper presents the design and implementation of tile toolkit, as well as evaluation of its effectiveness with three widely-deployed network services.
| Original language | English (US) |
|---|---|
| Pages (from-to) | 45-60 |
| Number of pages | 16 |
| Journal | Operating Systems Review (ACM) |
| Volume | 36 |
| Issue number | Special Issue |
| DOIs | |
| State | Published - Dec 31 2002 |
| Event | 5th Symposium on Operating Systems Design and Implementation, OSDI 2002 - Boston, United States Duration: Dec 9 2002 → Dec 11 2002 |
ASJC Scopus subject areas
- Information Systems
- Hardware and Architecture
- Computer Networks and Communications