Stealth DoS

نویسندگان

  • Marcel Waldvogel
  • Michael Muncan
  • Mahak Patidar
چکیده

Users and providers increasingly disagree on what Denial of Service (DoS) is. For example, an ISP might consider large multimedia downloads an attack to overload its infrastructure or have it pay high interconnection fees. On the other hand, a user will certainly consider selective bandwidth reduction that is used by ISPs as a countermeasure, as a DoS measure. Given the nature of their business relationship, neither side is likely to openly admit that they are fighting each other. In this paper we attempt to formalise the concept of Stealth DoS, including listing mechanisms that may be used at high link speeds. We concentrate on mechanisms that might be used in one particular area, voice over IP (VoIP). We start evaluating them under the different aspects, including their cost, political suitability and the likelihood for countermeasures to succeed. We expect that this will give both sides better insight on their options and plea for peace, hopefully in an attempt to avoid and open war.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Stealth-MITM DoS Attacks on Secure Channels

We de ne stealth Man-in-the-Middle adversaries, and analyse their ability to launch denial and degradation of service (DoS) attacks on secure channels. We show realistic attacks, disrupting TCP communication over secure VPNs using IPsec. We present: 1. First amplifying DoS attack on IPsec, when deployed without anti-replay window. 2. First amplifying attack on IPsec, when deployed with a `small...

متن کامل

Stealth DoS Attacks on Secure Channels

We initiate study of the use of ‘secure tunnel’ protocols, specifically IPsec, and its availability and performance guarantees to higher-layer protocols, in particular TCP, against Denial/Degradation of Service (DoS) attacks. IPsec is designed to provide privacy and authentication against MITM attackers, and employs an anti-replay mechanism to ensure performance. For our analysis, we define a n...

متن کامل

Intrusion Tolerance of Stealth DoS Attacks to Web Services

This paper focuses on one of the most harmful categories of Denial of Service attacks, commonly known in the literature as “stealth” attacks. They are performed avoiding to send significant volumes of data, by injecting into the network a low-rate flow of packets in order to evade rate-controlling detection mechanisms. This work presents an intrusion tolerance solution, which aims at providing ...

متن کامل

Encapsulation into Stealth Liposomes Enhances the Antitumor Action of Recombinant Cratylia mollis Lectin Expressed in Escherichia coli

This study evaluated the in vivo antitumor potential of the recombinant lectin from seeds of Cratylia mollis (rCramoll) expressed in Escherichia coli, free or encapsulated in stealth liposomes, using mice transplanted with sarcoma 180. rCramoll-loaded stealth liposomes (rCramoll-lipo) were formulated by hydration of the lipid film followed by cycles of freezing and thawing, and about 60% of rCr...

متن کامل

Stealth Navigation: Planning and Behaviors

Stealth navigation is a fundamental capability for a scout vehicle to e ectively perform reconnaissance missions. One component of stealth is the ability to plan paths that minimize visibility of the vehicle from target locations. This paper demonstrates a stealth planning system using visibility analysis on digital terrain elevation maps for path planning. Goal locations can be user speci ed o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006