DocumentCode
2022477
Title
Denial of Service Attacks in Networks with Tiny Buffers
Author
Havary-Nassab, Veria ; Koulakezian, Agop ; Ganjali, Yashar
Author_Institution
Dept. of Electr. & Comput. Eng., Univ. of Toronto, Toronto, ON
fYear
2009
fDate
19-25 April 2009
Firstpage
1
Lastpage
6
Abstract
Recently, several papers have studied the possibility of shrinking buffer sizes in Internet core routers to just a few dozen packets under certain constraints. If proven right, these results can open doors to building all-optical routers, since a major bottleneck in building such routers is the lack of large optical memories. However, reducing buffer sizes might pose new security risks: it is much easier to fill up tiny buffers, and thus organizing Denial of Service (DoS) attacks seems easier in a network with tiny buffers. To the best of our knowledge, such risks have not been studied before; all the focus has been on performance issues such as throughput, drop rate, and flow completion times. In this paper, we study DoS attacks in the context of networks with tiny buffers. We show that even though it is easier to fill up tiny buffers, synchronizing flows is more difficult. Therefore to reduce the network throughput, the attacker needs to utilize attacks with high packet injection rates. Since such attacks are easily detected, we conclude that DoS attacks are in fact more difficult in networks with tiny buffers.
Keywords
Internet; computer network management; security of data; telecommunication security; DoS attack; Internet core router; denial of service attacks; tiny buffered network; Bandwidth; Computer crime; Computer science; Degradation; Filling; IP networks; Optical buffering; Organizing; Telecommunication traffic; Throughput;
fLanguage
English
Publisher
ieee
Conference_Titel
INFOCOM Workshops 2009, IEEE
Conference_Location
Rio de Janeiro
Print_ISBN
978-1-4244-3968-3
Type
conf
DOI
10.1109/INFCOMW.2009.5072124
Filename
5072124
Link To Document