Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing

نویسندگان

  • Ying Zhang
  • Zhuoqing Morley Mao
  • Jia Wang
چکیده

Compared to attacks against end hosts, Denial of Service (DoS) attacks against the Internet infrastructure such as those targeted at routers can be more devastating due to their global impact on many networks. We discover that the recently identified low-rate TCP-targeted DoS attacks can have severe impact on the Border Gateway Protocol (BGP). As the interdomain routing protocol on today’s Internet, BGP is the critical infrastructure for exchanging reachability information across the global Internet. We demonstrate empirically that BGP routing sessions on the current commercial routers are susceptible to such low-rate attacks launched remotely, leading to session resets and delayed routing convergence, seriously impacting routing stability and network reachability. This is a result of a fundamental weakness with today’s deployed routing protocols: there is often no protection in the form of guaranteed bandwidth for routing traffic. Using testbed and Internet experiments, we thoroughly study the effect of such attacks on BGP. We demonstrate the feasibility of launching the attack in a coordinated fashion from wide-area hosts with arbitrarily lowrate individual attack flows, further raising the difficulty of detection. We explore defense solutions by protecting routing traffic using existing router support. Our findings highlight the importance of protecting the Internet infrastructure, in particular control plane packets.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Newshrew: Study of Tcp-targeted Ddos Attack

Distributed Denial of Service (DDoS) attack has become one of the major threats to Internet. Traditional brute-force, high-rate DDoS attacks expose many obvious anomaly features to defense systems, so that they can be easily detected and mitigated. Low-rate TCP-targeted Denial-of-Service(DoS) attacks aim at the fact that most operating systems in use today have a common base TCP Retransmission ...

متن کامل

Performance Comparison of Host Identity Protocol and TCP/IP with Firewall against Denial of Services

Host Identity Protocol (HIP) is a new kind of Internet protocol which has been developed to resolve the existing problems of Internet protocol TCP/IP. As a new protocol HIP provides many advantages compared to TCP/IP such as in the aspect of security and mobility. Unfortunately, the deployability rate of HIP was still low. One of the reason is because particular solution for currently Internet ...

متن کامل

On Modeling and Mitigating New Breed of Dos Attacks

ON MODELING AND MITIGATING NEW BREED OF DOS ATTACKS by Amey Bhaskar Shevtekar Denial of Service (DoS) attacks pose serious threats to the Internet, exerting in tremendous impact on our daily lives that are heavily dependent on the good health of the Internet. This dissertation aims to achieve two objectives: 1) to model new possibilities of the low rate DoS attacks; 2) to develop effective miti...

متن کامل

Effectiveness of rate-limiting in mitigating flooding DOS attacks

This paper investigates the effectiveness of rate-limiting in mitigating TCP-based flooding Denial of Service (DoS) attacks. Rate-limiting is used as a DoS defense mechanism to discard a fraction of incoming attack packets. Part of legitimate traffic is, however, mis-detected as attack traffic. The main contribution of this paper is to find out how much a DoS attack can be rate-limited without ...

متن کامل

TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection

End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment with the assumption that the end hosts voluntarily participate in it and obey the congestion control rules. The steady growth of malicious activities such as Denial-of-Service attacks (DoS) on the Internet reveals that the Internet no longer remains as a network of only trusted entities. The focus...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007