Exploiting the transients of adaptation for RoQ attacks on Internet resources

被引:61
作者
Guirguis, M [1 ]
Bestavros, A [1 ]
Matta, I [1 ]
机构
[1] Boston Univ, Dept Comp Sci, Boston, MA 02215 USA
来源
12TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS - PROCEEDINGS | 2004年
关键词
D O I
10.1109/ICNP.2004.1348109
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We expose an unorthodox adversarial attack that exploits the transients of a system's adaptive behavior as opposed to Its limited steady-state capacity. We show that a well orchestrated attack could introduce significant inefficiencies that could potentially deprive a network element from much of its capacity, or significantly reduce its service quality, while evading detection by consuming an unsuspicious, small fraction of that element's hijacked capacity. This type of attack stands in sharp contrast to traditional brute-force, sustained high-rate DoS attacks, as well as recently proposed attacks that exploit specific protocol settings such as TCP timeouts. We exemplify what we term as Reduction of Quality (RoQ) attacks by exposing the vulnerabilities of common adaptation mechanisms. We develop control-theoretic models and associated metrics to quantify these vulnerabilities. We present numerical and simulation results, which we validate with observations from real Internet experiments. Our findings motivate the need for the development of adaptation mechanisms that are resilient to these new forms of attacks.
引用
收藏
页码:184 / 195
页数:12
相关论文
共 31 条
[1]   REM: Active queue management [J].
Athuraliya, S ;
Low, SH ;
Li, VH ;
Yin, QH .
IEEE NETWORK, 2001, 15 (03) :48-53
[2]  
BALAKRISHNAN H, ACM SIGCOMM 1996
[3]  
BANSAL D, INFOCOM 2001
[4]  
CERT, 1996, ADV CA 1996 21 TCP S
[5]  
*CERT, 2001, TRENDS DEN SERV ATT
[6]  
*CERT, DEN SERV ATT
[7]  
DOEPPNER T, 2000, ACM C COMP COMM SEC
[8]  
Estan C., 2002, ACM SIGCOMM
[9]  
FERGUSON P, 2267 RFC
[10]  
FLOYD S, 2003, IETF DRAFT HIGH SPEE