Stealth DoS
نویسندگان
چکیده
Users and providers increasingly disagree on what Denial of Service (DoS) is. For example, an ISP might consider large multimedia downloads an attack to overload its infrastructure or have it pay high interconnection fees. On the other hand, a user will certainly consider selective bandwidth reduction that is used by ISPs as a countermeasure, as a DoS measure. Given the nature of their business relationship, neither side is likely to openly admit that they are fighting each other. In this paper we attempt to formalise the concept of Stealth DoS, including listing mechanisms that may be used at high link speeds. We concentrate on mechanisms that might be used in one particular area, voice over IP (VoIP). We start evaluating them under the different aspects, including their cost, political suitability and the likelihood for countermeasures to succeed. We expect that this will give both sides better insight on their options and plea for peace, hopefully in an attempt to avoid and open war.
منابع مشابه
Stealth-MITM DoS Attacks on Secure Channels
We de ne stealth Man-in-the-Middle adversaries, and analyse their ability to launch denial and degradation of service (DoS) attacks on secure channels. We show realistic attacks, disrupting TCP communication over secure VPNs using IPsec. We present: 1. First amplifying DoS attack on IPsec, when deployed without anti-replay window. 2. First amplifying attack on IPsec, when deployed with a `small...
متن کاملStealth DoS Attacks on Secure Channels
We initiate study of the use of ‘secure tunnel’ protocols, specifically IPsec, and its availability and performance guarantees to higher-layer protocols, in particular TCP, against Denial/Degradation of Service (DoS) attacks. IPsec is designed to provide privacy and authentication against MITM attackers, and employs an anti-replay mechanism to ensure performance. For our analysis, we define a n...
متن کاملIntrusion Tolerance of Stealth DoS Attacks to Web Services
This paper focuses on one of the most harmful categories of Denial of Service attacks, commonly known in the literature as “stealth” attacks. They are performed avoiding to send significant volumes of data, by injecting into the network a low-rate flow of packets in order to evade rate-controlling detection mechanisms. This work presents an intrusion tolerance solution, which aims at providing ...
متن کاملEncapsulation into Stealth Liposomes Enhances the Antitumor Action of Recombinant Cratylia mollis Lectin Expressed in Escherichia coli
This study evaluated the in vivo antitumor potential of the recombinant lectin from seeds of Cratylia mollis (rCramoll) expressed in Escherichia coli, free or encapsulated in stealth liposomes, using mice transplanted with sarcoma 180. rCramoll-loaded stealth liposomes (rCramoll-lipo) were formulated by hydration of the lipid film followed by cycles of freezing and thawing, and about 60% of rCr...
متن کاملStealth Navigation: Planning and Behaviors
Stealth navigation is a fundamental capability for a scout vehicle to e ectively perform reconnaissance missions. One component of stealth is the ability to plan paths that minimize visibility of the vehicle from target locations. This paper demonstrates a stealth planning system using visibility analysis on digital terrain elevation maps for path planning. Goal locations can be user speci ed o...
متن کامل