Amey Shevtekar

Learn More
—We propose a new stealthy DDoS attack model referred to as the " quiet " attack. The attack traffic consists of TCP traffic only. Widely used botnets in today's various attacks and newly introduced network feedback control are integral part of the quiet attack model. We show that short-lived TCP flows can be intentionally misused. The quiet attack is(More)
— Low rate TCP Denial-of-Service attacks are a new type of DoS attacks that are carefully orchestrated to exploit the fixed minimum TCP RTO property, and thereby deny services to legitimate users. This type of attacks is different from traditional flood-based attacks, and hence conventional solutions to detect these attacks are not applicable. We propose a(More)
We propose a router-based technique to mitigate the stealthy reduction of quality (RoQ) attacks at the routers in the Internet. The RoQ attacks have been shown to impair the QoS sensitive VoIP and the TCP traffic in the Internet. It is difficult to detect these attacks because of their low average rates. We also show that our generalized approach can detect(More)
Low rate DoS attacks are emerging threats to the TCP traffic, and the VoIP traffic in the Internet. They are hard to detect as they intelligently send attack traffic inside the network to evade current router based congestion control mechanisms. We propose a practical attack model in which botnets that can pose a serious threat to the Internet are(More)
Deadlock is a critical problem of any wormhole network. Algorithms have been developed to avoid or recover from deadlocks. In existing approaches for deadlock-free routing any possibility of deadlock occurrence is eliminated, which can result in putting extra restrictions on the routing or put no restrictions on routing, which leads to other approach namely(More)
  • 1