Cargando…
Memcached: An Experimental Study of DDoS Attacks for the Wellbeing of IoT Applications
Distributed denial-of-service (DDoS) attacks are significant threats to the cyber world because of their potential to quickly bring down victims. Memcached vulnerabilities have been targeted by attackers using DDoS amplification attacks. GitHub and Arbor Networks were the victims of Memcached DDoS a...
Autores principales: | , , , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8659833/ https://www.ncbi.nlm.nih.gov/pubmed/34884075 http://dx.doi.org/10.3390/s21238071 |
_version_ | 1784613058585296896 |
---|---|
author | Mishra, Nivedita Pandya, Sharnil Patel, Chirag Cholli, Nagaraj Modi, Kirit Shah, Pooja Chopade, Madhuri Patel, Sudha Kotecha, Ketan |
author_facet | Mishra, Nivedita Pandya, Sharnil Patel, Chirag Cholli, Nagaraj Modi, Kirit Shah, Pooja Chopade, Madhuri Patel, Sudha Kotecha, Ketan |
author_sort | Mishra, Nivedita |
collection | PubMed |
description | Distributed denial-of-service (DDoS) attacks are significant threats to the cyber world because of their potential to quickly bring down victims. Memcached vulnerabilities have been targeted by attackers using DDoS amplification attacks. GitHub and Arbor Networks were the victims of Memcached DDoS attacks with 1.3 Tbps and 1.8 Tbps attack strengths, respectively. The bandwidth amplification factor of nearly 50,000 makes Memcached the deadliest DDoS attack vector to date. In recent times, fellow researchers have made specific efforts to analyze and evaluate Memcached vulnerabilities; however, the solutions provided for security are based on best practices by users and service providers. This study is the first attempt at modifying the architecture of Memcached servers in the context of improving security against DDoS attacks. This study discusses the Memcached protocol, the vulnerabilities associated with it, the future challenges for different IoT applications associated with caches, and the solutions for detecting Memcached DDoS attacks. The proposed solution is a novel identification-pattern mechanism using a threshold scheme for detecting volume-based DDoS attacks. In the undertaken study, the solution acts as a pre-emptive measure for detecting DDoS attacks while maintaining low latency and high throughput. |
format | Online Article Text |
id | pubmed-8659833 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-86598332021-12-10 Memcached: An Experimental Study of DDoS Attacks for the Wellbeing of IoT Applications Mishra, Nivedita Pandya, Sharnil Patel, Chirag Cholli, Nagaraj Modi, Kirit Shah, Pooja Chopade, Madhuri Patel, Sudha Kotecha, Ketan Sensors (Basel) Article Distributed denial-of-service (DDoS) attacks are significant threats to the cyber world because of their potential to quickly bring down victims. Memcached vulnerabilities have been targeted by attackers using DDoS amplification attacks. GitHub and Arbor Networks were the victims of Memcached DDoS attacks with 1.3 Tbps and 1.8 Tbps attack strengths, respectively. The bandwidth amplification factor of nearly 50,000 makes Memcached the deadliest DDoS attack vector to date. In recent times, fellow researchers have made specific efforts to analyze and evaluate Memcached vulnerabilities; however, the solutions provided for security are based on best practices by users and service providers. This study is the first attempt at modifying the architecture of Memcached servers in the context of improving security against DDoS attacks. This study discusses the Memcached protocol, the vulnerabilities associated with it, the future challenges for different IoT applications associated with caches, and the solutions for detecting Memcached DDoS attacks. The proposed solution is a novel identification-pattern mechanism using a threshold scheme for detecting volume-based DDoS attacks. In the undertaken study, the solution acts as a pre-emptive measure for detecting DDoS attacks while maintaining low latency and high throughput. MDPI 2021-12-02 /pmc/articles/PMC8659833/ /pubmed/34884075 http://dx.doi.org/10.3390/s21238071 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Mishra, Nivedita Pandya, Sharnil Patel, Chirag Cholli, Nagaraj Modi, Kirit Shah, Pooja Chopade, Madhuri Patel, Sudha Kotecha, Ketan Memcached: An Experimental Study of DDoS Attacks for the Wellbeing of IoT Applications |
title | Memcached: An Experimental Study of DDoS Attacks for the Wellbeing of IoT Applications |
title_full | Memcached: An Experimental Study of DDoS Attacks for the Wellbeing of IoT Applications |
title_fullStr | Memcached: An Experimental Study of DDoS Attacks for the Wellbeing of IoT Applications |
title_full_unstemmed | Memcached: An Experimental Study of DDoS Attacks for the Wellbeing of IoT Applications |
title_short | Memcached: An Experimental Study of DDoS Attacks for the Wellbeing of IoT Applications |
title_sort | memcached: an experimental study of ddos attacks for the wellbeing of iot applications |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8659833/ https://www.ncbi.nlm.nih.gov/pubmed/34884075 http://dx.doi.org/10.3390/s21238071 |
work_keys_str_mv | AT mishranivedita memcachedanexperimentalstudyofddosattacksforthewellbeingofiotapplications AT pandyasharnil memcachedanexperimentalstudyofddosattacksforthewellbeingofiotapplications AT patelchirag memcachedanexperimentalstudyofddosattacksforthewellbeingofiotapplications AT chollinagaraj memcachedanexperimentalstudyofddosattacksforthewellbeingofiotapplications AT modikirit memcachedanexperimentalstudyofddosattacksforthewellbeingofiotapplications AT shahpooja memcachedanexperimentalstudyofddosattacksforthewellbeingofiotapplications AT chopademadhuri memcachedanexperimentalstudyofddosattacksforthewellbeingofiotapplications AT patelsudha memcachedanexperimentalstudyofddosattacksforthewellbeingofiotapplications AT kotechaketan memcachedanexperimentalstudyofddosattacksforthewellbeingofiotapplications |