Preemptive Resource Management: Defending Against Resource Monopolizing DoS

Wataru Kaneko, Kenji Kono, Kentaro Shimizu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Resource-monopolizing Denial-of-Service (DoS) is one form of malicious code attack. An attacking code exclusively uses shared resources and attempts to drop the responsiveness of the machine so low that it is practically useless. Resource-monopolizing DoS is difficult to prevent in commodity operating systems, because they allow every process to compete for shared resources in an uncontrolled manner. This paper presents preemptive resource management, a scheme we developed to defend against resource-monopolizing DoS. Preemptive resource management extensively applies priority and preemption to every type of resource. It controls resource allocation based on priority, and preempts resources allocated to lower-priority processes based on the availability of shared resources. The experimental results we obtained suggest that preemptive resource management prevents resource-monopolizing DoS from impinging on the responsiveness of other innocent processes.

Original languageEnglish
Title of host publication21st IASTED International Multi-Conference on Applied Informatics
Pages662-669
Number of pages8
Publication statusPublished - 2003
Externally publishedYes
Event21st IASTED International Multi-Conference on Applied Informatics - Innsbruck, Austria
Duration: 2003 Feb 102003 Feb 13

Publication series

NameIASTED International Multi-Conference on Applied Informatics
Volume21

Other

Other21st IASTED International Multi-Conference on Applied Informatics
Country/TerritoryAustria
CityInnsbruck
Period03/2/1003/2/13

Keywords

  • Executable Contents
  • Malicious Code
  • Operating Systems
  • Resource Management
  • Security

ASJC Scopus subject areas

  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Preemptive Resource Management: Defending Against Resource Monopolizing DoS'. Together they form a unique fingerprint.

Cite this