Chinaunix首页 | 论坛 | 博客
  • 博客访问: 556080
  • 博文数量: 126
  • 博客积分: 2071
  • 博客等级: 大尉
  • 技术积分: 1522
  • 用 户 组: 普通用户
  • 注册时间: 2010-08-24 16:09
文章分类
文章存档

2013年(8)

2012年(37)

2011年(80)

2010年(1)

分类: 网络与安全

2011-02-10 23:37:32

Denial of Service attacks are presenting an increasing threat to the global internetworking infrastructure. Hosts with the divergent or malicious interests can readily subvert the protocols and infrastructure that Internet depends on. While TCP's congestion control algorithm is highly robust to diverse network conditions, its implicit assumption of end-system cooperation results in a well-known vulnerability by high-rate non-responsive flows. However, little is known about low-rate denial of service attacks. We have discovered that low-rate attacks can be as harmful as the high-rate ones, yet even more dangerous due to the fact that they are difficult for routers and counter-DoS mechanisms to detect. In particular, the low-rate attack (named the shrew attack) consists of short, maliciously-chosen-duration bursts of packets that repeat with a fixed, maliciously chosen, slow-time-scale frequency. This traffic pattern is carefully designed to exploit TCP's deterministic retransmission timeout mechanism. When multiplexed with TCP cross-traffic, such pattern is able to throttle TCP flows to a small fraction of their ideal rate while transmitting at sufficiently low average rate to elude detection. Moreover, we demonstrated the ubiquity of the attacks by launching limited-scale attacks in parts of the Internet.  



阅读(1208) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~