Title :
On remote exploitation of TCP sender for low-rate flooding denial-of-service attack
Author :
Kumar, V. Anil ; Jayalekshmy, P.S. ; Patra, G.K. ; Thangavelu, R.P.
Author_Institution :
Council of Sci. & Ind. Res., Bangalore
fDate :
1/1/2009 12:00:00 AM
Abstract :
This letter shows a potentially harmful scenario named Induced-shrew attack in which a malicious TCP receiver remotely controls the transmission rate and pattern of a TCP sender to exploit it as a flood source for launching low-rate denial-of-service (DoS) attacks. Through simulation, proof-of concept implementation and experimentation in testbed and realworld Internet paths, we demonstrate that standard implementation of TCP senders can be exploited as flood sources for low-rate DoS attacks without compromising them. We describe the nature of the underlying vulnerability and discuss possible countermeasures against the induced-shrew.
Keywords :
IEEE standards; Internet; telecommunication services; transport protocols; DoS; Induced-shrew attack; TCP; denial-of-service; Computer crime; Costs; Councils; Data communication; Filling; Floods; Government; Information technology; Internet; Testing; Low-rate DoS attacks, malicious TCP receiver, TCP congestion control, ACK spoofing.;
Journal_Title :
Communications Letters, IEEE
DOI :
10.1109/LCOMM.2009.081555