Attackers, Packets, and Puzzles: On Denial-of-Service Prevention in Local Area Networks

نویسنده

  • Yves Igor Jerschow
چکیده

In this thesis, we tackle the problem of securing communication in Local Area Networks (LANs) and making it resistant against Denial-of-Service (DoS) attacks. The main vulnerability in wired and wireless LANs is the lack of initial address authenticity. It enables an attacker to take on different identities and to inject faked packets bearing a foreign or a bogus sender address. For this reason existing DoS countermeasures developed to mitigate attacks in the Internet have drawbacks when being applied in LANs. Our first contribution is the Cryptographic Link Layer (CLL)—a comprehensive security protocol that provides authentication and confidentiality between neighboring hosts from the link layer upwards. CLL employs public-key cryptography to identify all hosts in the Ethernet LAN based on their IP/MAC address pairs. Unicast IP traffic is safeguarded by means of a block cipher and a message authentication code. CLL extends ARP and DHCP handshakes with authentication to protect these protocols against various kinds of attacks. Beginning with an ARP handshake, two hosts exchange certificates and cryptographic parameters, authenticate each other, and negotiate symmetric keys to establish a security association. CLL has been implemented on both Windows and Linux and achieves a very competitive performance. Verifying digital signatures in the handshake phase of CLL and of other security protocols that rely on public-key cryptography is a very expensive task compared to symmetric-key operations. Thus, it may become a target for DoS attacks where the adversary floods a victim host with faked signature packets trying to overload it. We introduce a countermeasure against DoS flooding attacks on public-key handshakes in LANs, called counter-flooding. A benign host trying to initiate an authentication handshake to a victim system that suffers from a flooding attack reacts to this aggression by flooding itself multiple copies of its signature packet for a short period. The key idea is for the victim host to verify only a fixed number of signatures per time period without becoming overloaded and to select those packets for verification that have the largest number of duplicates. We provide bounds for counter-flooding to succeed and show experimentally that in switched Ethernet a reasonable fair bandwidth division between concurrent flows is usually ensured.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Constant Low-Frequency Appilication Layer Ddos Attacks Using Collaborative Algorithms

— A DDoS (i.e., Distributed Denial of Service) attack is a large scale distributed attempt by malicious attackers to fill the users’ network with a massive number of packets. This exhausts resources like bandwidth, computing power, etc.; User can’t provide services to its clients and network performance get destroyed. The methods like hop count filtering; rate limiting and statistical filtering...

متن کامل

Slander Resistant Attacker Isolation in Ad Hoc Networks

This paper focuses on how to isolate attackers that inject packets to cause denial-of-service (DoS) effects in ad hoc networks. Our security analysis shows that current hop-by-hop source authentication protocols only partially achieve the defense goals, although they allow forwarding nodes to effectively identify and discard injected or modified packets. The other important defense goal, which ...

متن کامل

Study on Jammers and Defense Strategies in Wireless Networks

Wireless networks overcame the limitations of the traditional approaches in the implementation of the wired networks. The number of nodes can be easily extended and provided with then the services of the networks. Amenities of the private networks are risked by the invaders and their activities to disclose the confidential contents. These invaders established a standard mode of attacking by jam...

متن کامل

Source Address Validation Implementation by Using BGP

The persistent evolution of the Internet continues to transform the way individuals, as well as businesses, educational institutions, and government organizations access, share, and communicate information. Convergence of digital voice, video, and data, is further consolidating the Internet as a critical infrastructure. One of the main routing protocols in the Internet and current de facto stan...

متن کامل

Distributed Denial of Service (DDoS) Attacks Detection Mechanism

Pushback is a mechanism for defending against Distributed Denial-of-Service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congestion is caused by malicious hosts not obeying traditional end-to-end congestion control, the problem must be handled by the routers. Functionality is added to each router to detect and preferentially drop packets that p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012