On Remote Exploitation of TCP Sender for Low-Rate Flooding Denial-of-Service Attack
IR@C-MMACS: CSIR-Centre for Mathematical Modelling and Computer Simulation, Bangalore
View Archive InfoField | Value | |
Title |
On Remote Exploitation of TCP Sender for
Low-Rate Flooding Denial-of-Service Attack
|
|
Creator |
V, Anil Kumar
Patra, G K R P, Thangavelu |
|
Subject |
Computer Networks
Computer Programming and Software |
|
Description |
This letter shows a potentially harmful scenario
named Induced-shrew attack in which a malicious TCP receiver
remotely controls the transmission rate and pattern of a TCP
sender to exploit it as a flood source for launching low-rate
Denial-of-Service (DoS) attacks. Through simulation, proof-ofconcept
implementation and experimentation in testbed and realworld
Internet paths, we demonstrate that standard implementation
of TCP senders can be exploited as flood sources for
low-rate DoS attacks without compromising them. We describe
the nature of the underlying vulnerability and discuss possible
countermeasures against the Induced-shrew.
|
|
Publisher |
IEEE Communications Society
|
|
Date |
2009-01
|
|
Type |
Article
PeerReviewed |
|
Format |
application/pdf
|
|
Identifier |
http://cir.cmmacs.ernet.in/49/1/anil%2Dieee1.pdf
V, Anil Kumar and Patra, G K and R P, Thangavelu (2009) On Remote Exploitation of TCP Sender for Low-Rate Flooding Denial-of-Service Attack. IEEE COMMUNICATIONS LETTERS, 13 (1). ISSN 1089-7798 |
|
Relation |
http://www.ieee.org
http://cir.cmmacs.ernet.in/49/ |
|