DocumentCode
438813
Title
Optimizing the pulsing denial-of-service attacks
Author
Luo, Xiapu ; Chang, Rocky K C
Author_Institution
Dept. of Comput., Hong Kong Polytech. Univ., Kowloon, CHINA
fYear
2005
fDate
28 June-1 July 2005
Firstpage
582
Lastpage
591
Abstract
In this paper we consider how to optimize a new generation of pulsing denial-of-service (PDoS) attacks from the attackers´ points of views. The PDoS attacks are ´smarter´ than the traditional attacks in several aspects. The most obvious one is that they require fewer attack packets to cause a similar damage. Another is that the PDoS attacks can be tuned to achieve different effects. This paper concentrates on the attack tuning part. In particular, we consider two conflicting goals involved in launching a PDoS attack: (1) maximizing the throughput degradation and (2) minimizing the risk of being detected. To address this problem, we first analyze the TCP throughput and quasi-global synchronization phenomenon caused by the PDoS attack. We then propose a family of objective functions to incorporate the two conflicting goals, and obtain the optimal attack settings. To validate the analytical results, we have carried out extensive experiments using both ns-2 simulation and a test-bed. The overall experimental results match well with the analytical results.
Keywords
computer crime; telecommunication security; transport protocols; TCP throughput; ns-2 simulation; pulsing PDoS attacks; pulsing denial-of-service attack optimization; quasiglobal synchronization phenomenon; risk minimization; throughput degradation maximization; Analytical models; Application software; Computational modeling; Computer crime; Computer security; Computer vision; Degradation; Floods; Testing; Throughput;
fLanguage
English
Publisher
ieee
Conference_Titel
Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on
Print_ISBN
0-7695-2282-3
Type
conf
DOI
10.1109/DSN.2005.75
Filename
1467832
Link To Document