Stealing Bandwidth via Link-targeted Interference Attacks∗ MINA GUIRGUIS AZER BESTAVROS IBRAHIM MATTA

نویسندگان

  • Mina Guirguis
  • Azer Bestavros
  • Ibrahim Matta
چکیده

We expose an adversarial attack scheme that aims to steal bandwidth for the benefit of a particular set of flows through lunching a distributed interference attack streams on competing flows. The extent to which the interference attack streams were successful in reducing or denying bandwidth from competing flows determines the amount of bandwidth stolen. Given such a goal, our exposed scheme stands in sharp contrast to sustained high-rate Denial-of-Service (DoS) attacks targeted directly at a specific resource or a set of flows. We demonstrate two schemes for the construction of an interference attack stream that would evade detection, and thus challenging counter-DoS techniques. Our results show the vulnerability of the current Internet to those new forms of attacks that could be easily mounted with a few number of zombie clients. We validate our findings through simple analysis, simulations and real Internet experiments.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bandwidth Stealing via Link-targeted Roq Attacks

We present a scheme that enables a set of flows to acquire an unfair share of bandwidth by mounting an adversarial distributed Reduction of Quality (RoQ) attack on flows competing for that bandwidth. This adversarial behavior stands in sharp contrast to other network exploits, e.g., Denial-ofService (DoS) attacks, whose aim is to simply take down a resource, or severely limit access to a servic...

متن کامل

Reduction of Quality (RoQ) Attacks on Internet End-Systems † MINA GUIRGUIS AZER BESTAVROS IBRAHIM MATTA

Current computing systems depend on adaptation mechanisms to ensure that they remain in quiescent operating regions. These regions are often defined using efficiency, fairness, and stability properties. To that end, traditional research works in scalable server architectures and protocols have focused on promoting these properties by proposing even more sophisticated adaptation mechanisms, with...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004