Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks

被引:19
作者
Ben-Porat, Udi [1 ]
Bremler-Barr, Anat [2 ]
Levy, Hanoch [3 ]
机构
[1] ETH, Comp Engn & Networks Lab TIK, CH-8006 Zurich, Switzerland
[2] Interdisciplinary Ctr, Efi Arazi Sch Comp Sci, Dept Comp Sci, IL-46150 Herzliyya, Israel
[3] Tel Aviv Univ, Dept Comp Sci, Sch Comp Sci, IL-69978 Tel Aviv, Israel
关键词
DDoS; hash; queue; vulnerability; metric; malicious;
D O I
10.1109/TC.2012.49
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, we have experienced a wave of DDoS attacks threatening the welfare of the internet. These are launched by malicious users whose only incentive is to degrade the performance of other, innocent, users. The traditional systems turn out to be quite vulnerable to these attacks. The objective of this work is to take a first step to close this fundamental gap, aiming at laying a foundation that can be used in future computer/network designs taking into account the malicious users. Our approach is based on proposing a metric that evaluates the vulnerability of a system. We then use our vulnerability metric to evaluate a data structure which is commonly used in network mechanisms-the Hash table data structure. We show that Closed Hash is much more vulnerable to DDoS attacks than Open Hash, even though the two systems are considered to be equivalent by traditional performance evaluation. We also apply the metric to queuing mechanisms common to computer and communications systems. Furthermore, we apply it to the practical case of a hash table whose requests are controlled by a queue, showing that even after the attack has ended, the regular users still suffer from performance degradation or even a total denial of service.
引用
收藏
页码:1031 / 1043
页数:13
相关论文
共 27 条
  • [1] [Anonymous], ALGORITHMIC COMPLEXI
  • [2] [Anonymous], 1999, DISTR DEN SERV TOOLS
  • [3] Bar-Yosef N., 2006, THESIS TEL AVIV U TE
  • [4] Bellardo J., 2003, P USENIX SEC S JUN
  • [5] Ben-Porat U., 2009, P IEEE INFOCOM
  • [6] Ben-Porat U., 2008, P IEEE INFOCOM
  • [7] Ben-Porat U., 2011, P IEEE INFOCOM
  • [8] Bremler-Barr A., 2006, P IEEE INT WORKSH QU
  • [9] CARTER JL, 1979, J COMPUT SYST SCI, V18, P143, DOI 10.1016/0022-0000(79)90044-8
  • [10] Castelluccia C., 2005, P USENIX SEC S APR