DocumentCode :
1073095
Title :
On remote exploitation of TCP sender for low-rate flooding denial-of-service attack
Author :
Kumar, V. Anil ; Jayalekshmy, P.S. ; Patra, G.K. ; Thangavelu, R.P.
Author_Institution :
Council of Sci. & Ind. Res., Bangalore
Volume :
13
Issue :
1
fYear :
2009
fDate :
1/1/2009 12:00:00 AM
Firstpage :
46
Lastpage :
48
Abstract :
This letter shows a potentially harmful scenario named Induced-shrew attack in which a malicious TCP receiver remotely controls the transmission rate and pattern of a TCP sender to exploit it as a flood source for launching low-rate denial-of-service (DoS) attacks. Through simulation, proof-of concept implementation and experimentation in testbed and realworld Internet paths, we demonstrate that standard implementation of TCP senders can be exploited as flood sources for low-rate DoS attacks without compromising them. We describe the nature of the underlying vulnerability and discuss possible countermeasures against the induced-shrew.
Keywords :
IEEE standards; Internet; telecommunication services; transport protocols; DoS; Induced-shrew attack; TCP; denial-of-service; Computer crime; Costs; Councils; Data communication; Filling; Floods; Government; Information technology; Internet; Testing; Low-rate DoS attacks, malicious TCP receiver, TCP congestion control, ACK spoofing.;
fLanguage :
English
Journal_Title :
Communications Letters, IEEE
Publisher :
ieee
ISSN :
1089-7798
Type :
jour
DOI :
10.1109/LCOMM.2009.081555
Filename :
4753961
Link To Document :
بازگشت