Human-Targeted Denial of Service
نویسندگان
چکیده
Providing live support over the Net is much cheaper than the 1-800 option since an operator can handle several chat sessions simultaneously. The downside of this approach, however, is that “the human in the loop” can now be a target of a new class of network attacks. Take a simple chat-bot program that connects to an online chat service. Smart it is not – an operator can tell it from a human after a few sentences. But that would be too late – the bot has already wasted a few precious minutes of the human assistant’s time at the expense of only a few milliseconds of the attacker’s CPU. And several hundreds of such bots can easily overwhelm the whole team of support operators. In a sense, this makes a semantic Denial of Service (DoS) attack targeted against real people on the Net. We call this attack Human-Targeted Denial of Service, or HTDoS.
منابع مشابه
RESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملHF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets
Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...
متن کاملSeek and Destroy: Targeted Resource Depletion Attacks on Sensor Networks
Denial of service attacks can be catastrophic in wireless sensor networks. Typical denial of service attacks consist of either communications jamming or resource depletion through forcing continuous stimuli and communication between motes on the network. Localization is another interesting challenge in the world of sensor networks. Many applications utilizing sensor networks require that the an...
متن کاملNeural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks
Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...
متن کاملDetecting Denial of Service Message Flooding Attacks in SIP based Services
Increasing the popularity of SIP based services (VoIP, IPTV, IMS infrastructure) lead to concerns about its security. The main signaling protocol of next generation networks and VoIP systems is Session Initiation Protocol (SIP). Inherent vulnerabilities of SIP, misconfiguration of its related components and also its implementation deficiencies cause some security concerns in SIP based infra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003