Multiplexed Asymmetric Attacks: Next-Generation DDoS on HTTP/2 Servers

dc.contributor.authorPraseed, A.
dc.contributor.authorSanthi Thilagam, P.
dc.date.accessioned2026-02-05T09:29:17Z
dc.date.issued2020
dc.description.abstractDistributed Denial of Service (DDoS) attacks using the HTTP protocol have started gaining popularity in recent years. A recent trend in this direction has been the use of computationally expensive requests to launch attacks. These attacks, called Asymmetric Workload attacks can bring down servers using limited resources, and are extremely difficult to detect. The introduction of HTTP/2 has been welcomed by developers because it improves user experience and efficiency. This was made possible by the ability to transport HTTP requests and their associated inline resources simultaneously by using Multiplexing and Server Push. However multiplexing has made request traffic bursty and rendered DDoS detection mechanisms based on connection limiting obsolete. Contrary to its intention, multiplexing can also be misused to launch sophisticated DDoS attacks using multiple high workload requests in a single TCP connection. However, sufficient research has not been done in this area. Existing research demonstrates that the HTTP/2 protocol allows users to launch DDoS attacks easily, but does not focus on whether an HTTP/2 server can handle DDoS attacks more efficiently or not. Also, sufficient research has not been done on the possibility of Multiplexing and Server Push being misused. In this work, we analyse the performance of an HTTP/2 server compared to an HTTP/1.1 server under an Asymmetric DDoS attack for the same load. We propose a new DDoS attack vector called a Multiplexed Asymmetric DDoS attack, which uses multiplexing in a different way than intended. We show that such an attack can bring down a server with just a few attacking clients. We also show that a Multiplexed Asymmetric Attack on a server with Server Push enabled can trigger an egress network layer flood in addition to an application layer attack. © 2005-2012 IEEE.
dc.identifier.citationIEEE Transactions on Information Forensics and Security, 2020, 15, , pp. 1790-1800
dc.identifier.issn15566013
dc.identifier.urihttps://doi.org/10.1109/TIFS.2019.2950121
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/24189
dc.publisherInstitute of Electrical and Electronics Engineers Inc.
dc.subjectApplication Layer
dc.subjectHTTP
dc.subjectHypertext systems
dc.subjectMultiplexing
dc.subjectNetwork layers
dc.subjectNetwork security
dc.subjectUser experience
dc.subjectasymmetric workload
dc.subjectDDoS
dc.subjectDDoS detection
dc.subjectDistributed denial of service attack
dc.subjectHTTP protocols
dc.subjectmultiplexed asymmetric attack
dc.subjectServer pushes
dc.subjectTCP connections
dc.subjectDenial-of-service attack
dc.titleMultiplexed Asymmetric Attacks: Next-Generation DDoS on HTTP/2 Servers

Files

Collections