DocumentCode :
2022477
Title :
Denial of Service Attacks in Networks with Tiny Buffers
Author :
Havary-Nassab, Veria ; Koulakezian, Agop ; Ganjali, Yashar
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Toronto, Toronto, ON
fYear :
2009
fDate :
19-25 April 2009
Firstpage :
1
Lastpage :
6
Abstract :
Recently, several papers have studied the possibility of shrinking buffer sizes in Internet core routers to just a few dozen packets under certain constraints. If proven right, these results can open doors to building all-optical routers, since a major bottleneck in building such routers is the lack of large optical memories. However, reducing buffer sizes might pose new security risks: it is much easier to fill up tiny buffers, and thus organizing Denial of Service (DoS) attacks seems easier in a network with tiny buffers. To the best of our knowledge, such risks have not been studied before; all the focus has been on performance issues such as throughput, drop rate, and flow completion times. In this paper, we study DoS attacks in the context of networks with tiny buffers. We show that even though it is easier to fill up tiny buffers, synchronizing flows is more difficult. Therefore to reduce the network throughput, the attacker needs to utilize attacks with high packet injection rates. Since such attacks are easily detected, we conclude that DoS attacks are in fact more difficult in networks with tiny buffers.
Keywords :
Internet; computer network management; security of data; telecommunication security; DoS attack; Internet core router; denial of service attacks; tiny buffered network; Bandwidth; Computer crime; Computer science; Degradation; Filling; IP networks; Optical buffering; Organizing; Telecommunication traffic; Throughput;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
INFOCOM Workshops 2009, IEEE
Conference_Location :
Rio de Janeiro
Print_ISBN :
978-1-4244-3968-3
Type :
conf
DOI :
10.1109/INFCOMW.2009.5072124
Filename :
5072124
Link To Document :
بازگشت