Modeling and Mitigating the Coremelt Attack

نویسندگان

  • Guosong Yang
  • Hossein Hosseini
  • Dinuka Sahabandu
  • Andrew Clark
  • João Hespanha
  • Radha Poovendran
چکیده

This paper studies the Coremelt attack, a linkflooding Distributed Denial of Service attack that exhausts the bandwidth at a core network link using low-intensity traffics between subverted sources. A dynamical system model is formulated for analyzing the effect of the Coremelt attack on a single-link Transmission Control Protocol (TCP) network. Stability and convergence of the source flow rates are established using Lyapunov-based analysis. When the number of subverted sources is limited, a modified TCP algorithm is developed for the attackers to achieve a desired congestion level. A mitigation method is proposed to increase the bandwidth shared by legitimate users when the link is under attack. The network performance under different attack and mitigation scenarios is illustrated through simulation results.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Coremelt Attack

Current Denial-of-Service (DoS) attacks are directed towards a specific victim. The research community has devised several countermeasures that protect victim hosts against undesired traffic. We present Coremelt, a new attack mechanism, where attackers only send traffic between each other, and not towards a victim host. As a result, none of the attack traffic is unwanted. The Coremelt attack is...

متن کامل

Mitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion

Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...

متن کامل

Thermodynamic Modeling of the Effects of Wollastonite-Silica Fume Combination in the Cement Hydration and Sulfate Attack

Sulfate attack is a series of physico-chemical reactions between hardened cement paste and sulfate ions. Sulfate ion penetration into the hydrated cement results in the formation of voluminous and deleterious phases such as gypsum and ettringite which are believed to cause deterioration and expansion of concrete. Concrete deterioration due to sulfate attack depends on many parameters, however, ...

متن کامل

An Authorization Framework for Database Systems

Today, data plays an essential role in all levels of human life, from personal cell phones to medical, educational, military and government agencies. In such circumstances, the rate of cyber-attacks is also increasing. According to official reports, data breaches exposed 4.1 billion records in the first half of 2019. An information system consists of several components, which one of the most im...

متن کامل

A Holistic Approach to Attack Modeling and Analysis

Protecting socio-technical systems is a challenging task, as a single vulnerability or exposure of any component of the systems can lead to serious security breaches. This problem is exacerbated by the fact that the system development community has not kept up with advances in attack tactics. In this paper, we present ongoing research on the development of a holistic attack analysis technique. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017