YoVDO

HTTP Time Bandit: Identifying and Exploiting Web Application Performance Bottlenecks

Offered By: OWASP Foundation via YouTube

Tags

Web Application Security Courses Web Scraping Courses Network Traffic Analysis Courses DDoS Attacks Courses Performance Testing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of web application performance bottlenecks and potential vulnerabilities in this OWASP Foundation conference talk. Learn about a tool designed to identify resource-consuming pages through systematic testing and data normalization. Discover how this information can be leveraged for more efficient DOS/DDOS attacks using simple tools. Gain insights into the proposed method for detecting critical resources, statistical data normalization techniques, and the attack-like stage of testing. Examine the impact of commercial protection services and Apache configurations on server performance. Witness live demonstrations of the tool in action on various targets and learn about its availability for further research.

Syllabus

Intro
Classic Application Layer DOS/DDOS
The Proposed Method Method of detection of the critical resource • Spider over the web site and collect transfer times for each resource • Calculate the average speed and distribution of transfers Identify the resources that have slower average transfer times
Using Statistics to Normalize the Data
Attack Like Stage of Testing Measurement of service degradation while doing a hard test for narrowing down the choice of links
Commercial Protection Services . Few players using limiters for
Playing with Apache Configs Baseline, no protection • 1 client running 10x parallel requests of the most expensive resource • 3% CPU on the client machine Server: i7, 4 core, 8 gb • 98% CPU utilization on the server
mod_qos Implements control mechanisms to provide different priority to requests and control server access based on available resources 7
Conflicts with Slow* Attack Protection Slow* attack mitigation is an addition • mod_evasive could not protect from these There is no conflict (good news)


Taught by

OWASP Foundation

Related Courses

Data Wrangling with MongoDB
MongoDB via Udacity
Getting and Cleaning Data
Johns Hopkins University via Coursera
用Python玩转数据 Data Processing Using Python
Nanjing University via Coursera
Introduction to NodeJS
Microsoft via edX
用 Python 做商管程式設計(三)(Programming for Business Computing in Python (3))
National Taiwan University via Coursera