CSIR Central

On Remote Exploitation of TCP Sender for Low-Rate Flooding Denial-of-Service Attack

IR@C-MMACS: CSIR-Centre for Mathematical Modelling and Computer Simulation, Bangalore

View Archive Info
 
 
Field Value
 
Title On Remote Exploitation of TCP Sender for Low-Rate Flooding Denial-of-Service Attack
 
Creator V, Anil Kumar
Patra, G K
R P, Thangavelu
 
Subject Computer Networks
Computer Programming and Software
 
Description This letter shows a potentially harmful scenario named Induced-shrew attack in which a malicious TCP receiver remotely controls the transmission rate and pattern of a TCP sender to exploit it as a flood source for launching low-rate Denial-of-Service (DoS) attacks. Through simulation, proof-ofconcept implementation and experimentation in testbed and realworld Internet paths, we demonstrate that standard implementation of TCP senders can be exploited as flood sources for low-rate DoS attacks without compromising them. We describe the nature of the underlying vulnerability and discuss possible countermeasures against the Induced-shrew.
 
Publisher IEEE Communications Society
 
Date 2009-01
 
Type Article
PeerReviewed
 
Format application/pdf
 
Identifier http://cir.cmmacs.ernet.in/49/1/anil%2Dieee1.pdf
V, Anil Kumar and Patra, G K and R P, Thangavelu (2009) On Remote Exploitation of TCP Sender for Low-Rate Flooding Denial-of-Service Attack. IEEE COMMUNICATIONS LETTERS, 13 (1). ISSN 1089-7798
 
Relation http://www.ieee.org
http://cir.cmmacs.ernet.in/49/