Efficient defence against misbehaving TCP receiver DoS attacks

نویسنده

  • Aldar C.-F. Chan
چکیده

The congestion control algorithm in TCP relies on correct feedback from the receiver to determine the rate at which packets should be sent into the network. Hence, correct receiver feedback (in the form of acknowledgements in TCP) is essential to the goal of sharing the scarce bandwidth resources fairly and avoiding congestion collapse in the Internet. However, the assumption that a TCP receiver can always be trusted (to generate feedback correctly) no longer holds as there are plenty of incentives for a receiver to deviate from the protocol. In fact, it has been shown that a misbehaving receiver (whose aim is to bring about congestion collapse) can easily generate acknowledgements to conceal loss and drive a number of honest, innocent senders arbitrary fast to create a significant number of non-responsive packet flows leading to denial of service to other Internet users. We give two efficient, provably secure mechanisms to force a receiver to generate feedback correctly; any incorrect acknowledgement will be detected at the sender. The first scheme is based on an ideal cryptographic hash, and the second one on aggregate authenticators. We also show variants of the second scheme which can (partially) solve the problem of man-in-the-middle attacks, which is not achievable previously.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Congestion Control with a Misbehaving Receiver: Robust TFRC and Other Protocols

This paper examines the operation of TFRC (TCPFriendly Rate Control) in scenarios where the receiver is untrustworthy. By misbehaving, a TFRC receiver can obtain a higher data rate at the expense of competing traffic. We identify and experimentally confirm several such attacks and designed Robust TCP-Friendly Rate Control (RTFRC), a TFRC variant which is resilient to receiver misbehavior. We al...

متن کامل

TCP Ack Storm DoS Attacks

We present Ack-storm DoS attacks, a new family of DoS attacks exploiting a subtle design flaw in the core TCP specifications. The attacks can be launched by a very weak MitM attacker, which can only eavesdrop occasionally and spoof packets (a Weakling in the Middle (WitM)). The attacks can reach theoretically unlimited amplification; we measured amplification of over 400,000 against popular web...

متن کامل

Incrementally Deployable Prevention to TCP Attack with Misbehaving Receivers

In a TCP connection, selfish receiver has incentive to increase its own transmission rate at the expense of other receivers. Whether it is downloading a web page or transferring a file, most receivers prefer the server to focus only on their transmission and ignore those of other receivers. Unfortunately, the current TCP implementation can be easily exploited for a malicious receiver to gain an...

متن کامل

TCP Injections for Fun and Clogging

We present a new type of clogging DoS attacks, with the highest amplification factors achieved by off-path attackers, using only puppets, i.e., sandboxed malware on victim machines. Specifically, we present off-path variants of the Opt-ack, Ackstorm and Coremelt DoS attacks, achieving results comparable to these achieved previously achieved by eavesdropping/MitM attackers and (unrestricted) mal...

متن کامل

A New Mechanism for Improving Robustness of TCP against Pulsing Denial-of-Service Attacks

In this paper, we propose a new mechanism to combat pulsing Denial-of-Service (DoS) attacks. Pulsing DoS attacks can seriously degrade the throughput of legitimate TCP flows in a stealthy manner. The attacker send periodic short bursts of traffic (i.e. pulses) to cause packet losses of TCP flows. For improving robustness of TCP against the attacks, we propose to use adaptive bandwidth estimatio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Networks

دوره 55  شماره 

صفحات  -

تاریخ انتشار 2011