High-potency Models of LDoS Attack against CUBIC + RED

نویسندگان

چکیده

A TCP-targeted low-rate denial of service (LDoS) attack exploits the vulnerabilities TCP congestion control mechanism. The most widely used algorithm, CUBIC, increases resilience to LDoS. This paper explores high-potency patterns LDoS attacks against CUBIC under RED queue management scenario, and develops two models, D- S-models maximize potency (i.e., damage-to-cost ratio). Theoretical analyses extensive experiments are conducted validate proper function models evaluate their performance. Test results show that can effectively throttle throughput. Under standard-configured network parameters, one unit damage up about 21 26 units for S-models, respectively, which represents an increase in 20%. potencies our proposed at least 250% greater than traditional model. In addition, with variations different these still efficient alternatively potency. Finally, countermeasures outlined. present study offers a basis explore new manners may be exploited by attackers inspires researchers develop measurements such attack.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MSABMS-based approach of detecting LDoS attack

Low-rate Denial of Service (LDoS) attacks exploit the deficiencies of the minimum RTO of TCP to send out attack packets in short-duration periodic pulses with low average volume traffic in order to throttle TCP throughput. It is hard to detect an LDoS attack by most available detection schemes, which are triggered by high-rate traffic based on time average statistics. In this paper, the method ...

متن کامل

Correlation-based Detection of LDoS Attack

s—Low-rate Denial of Service (LDoS) attack and TCP flows are simulated in the time and frequency domain for the purpose of analyzing their signatures and extracting period T and duration L of LDoS attack, which are two correlative parameters used in the proposed detecting approach. In the correlation operation, the reference signal is the simulated traffic of LDoS attack, which are built based ...

متن کامل

Low Rate Denial of Service (LDoS) attack – A Survey

Denial Of service (DoS) attacks has become a major problem to intranet and Internet services. DoS attacks can be detected and eliminated using existing efficient Active Queue Management (AQM) schemes like RED. A new kind of DoS attacks have become more common in today’s Transmission control protocol (TCP) services, i.e., Low Rate Denial of Service (LDoS) attacks. LDoS attacks will degrade the p...

متن کامل

On Implementation of GHS Attack against Elliptic Curve Cryptosystems over Cubic Extension Fields of Odd Characteristics

In this paper, we present algorithms for implementation of the GHS attack to Elliptic curve cryptosystems (ECC). In particular, we consider two large classes of elliptic curves over cubic extension fields of odd characteristics which have weak covering curves against GHS attack, whose existence have been shown recently [16][17][18]. We show an algorithm to find definition equation of the coveri...

متن کامل

EEL6951 Project: Simulation of “LDoS Attack in Ad-hoc Network” by Y. He et al

LDoS (Low-rate Denial of Service) attack is periodic, stealthy, and with high efficiency, which has become a great threat to the network security. Previous researches about LDoS attack mainly focus on its impact on wired networks. However, our analysis shows that such attack could also be launched in Ad-hoc network, and as a completely distinct MAC layer protocol is adopted in this environment,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2021

ISSN: ['1556-6013', '1556-6021']

DOI: https://doi.org/10.1109/tifs.2021.3117066