Memcached DDoS攻击:操作,漏洞,预防和缓解

Kulvinder Singh, Ajit Singh
{"title":"Memcached DDoS攻击:操作,漏洞,预防和缓解","authors":"Kulvinder Singh, Ajit Singh","doi":"10.1109/CCCS.2018.8586810","DOIUrl":null,"url":null,"abstract":"This paper focuses on Memcached security from DDoS attacks during all stages of attack life cycle. It identifies Memcached architecture flaws on the one hand (which are long been ignored by developers of Memcached) and preventions/mitigation of DDoS attacks through several techniques depending on the type of vulnerability being exploited by the attacker on the other hand. In this paper we have explained the Memcached operations and architecture to identify and show the possible flaws in both of them. We have also taken reference of largest DDoS attacks ever recorded in the history of computer networks and as a follow up to recent attacks on Memcached this paper presents a fresh and strong list of simple commands and configuration security steps that are capable to avoid or mitigate Memcached DDoS attacks.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"06 1","pages":"171-179"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Memcached DDoS Exploits: Operations, Vulnerabilities, Preventions and Mitigations\",\"authors\":\"Kulvinder Singh, Ajit Singh\",\"doi\":\"10.1109/CCCS.2018.8586810\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper focuses on Memcached security from DDoS attacks during all stages of attack life cycle. It identifies Memcached architecture flaws on the one hand (which are long been ignored by developers of Memcached) and preventions/mitigation of DDoS attacks through several techniques depending on the type of vulnerability being exploited by the attacker on the other hand. In this paper we have explained the Memcached operations and architecture to identify and show the possible flaws in both of them. We have also taken reference of largest DDoS attacks ever recorded in the history of computer networks and as a follow up to recent attacks on Memcached this paper presents a fresh and strong list of simple commands and configuration security steps that are capable to avoid or mitigate Memcached DDoS attacks.\",\"PeriodicalId\":6570,\"journal\":{\"name\":\"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)\",\"volume\":\"06 1\",\"pages\":\"171-179\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCCS.2018.8586810\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCCS.2018.8586810","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

摘要

本文重点研究了Memcached在攻击生命周期各个阶段抵御DDoS攻击的安全性。它一方面识别Memcached架构缺陷(长期以来被Memcached开发人员所忽视),另一方面根据攻击者利用的漏洞类型,通过多种技术预防/缓解DDoS攻击。在本文中,我们解释了Memcached操作和体系结构,以识别和显示它们可能存在的缺陷。我们还参考了计算机网络历史上记录的最大的DDoS攻击,并作为最近对Memcached的攻击的后续行动,本文提出了一个新的强大的简单命令和配置安全步骤列表,能够避免或减轻Memcached DDoS攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Memcached DDoS Exploits: Operations, Vulnerabilities, Preventions and Mitigations
This paper focuses on Memcached security from DDoS attacks during all stages of attack life cycle. It identifies Memcached architecture flaws on the one hand (which are long been ignored by developers of Memcached) and preventions/mitigation of DDoS attacks through several techniques depending on the type of vulnerability being exploited by the attacker on the other hand. In this paper we have explained the Memcached operations and architecture to identify and show the possible flaws in both of them. We have also taken reference of largest DDoS attacks ever recorded in the history of computer networks and as a follow up to recent attacks on Memcached this paper presents a fresh and strong list of simple commands and configuration security steps that are capable to avoid or mitigate Memcached DDoS attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信