Exploiting the transients of adaptation for RoQ attacks on Internet resources

@article{Guirguis2004ExploitingTT,
  title={Exploiting the transients of adaptation for RoQ attacks on Internet resources},
  author={Mina Guirguis and Azer Bestavros and Ibrahim Matta},
  journal={Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004.},
  year={2004},
  pages={184-195}
}
We expose an unorthodox adversarial attack that exploits the transients of a system's adaptive behavior, as opposed to its limited steady-state capacity. We show that a well orchestrated attack could introduce significant inefficiencies that could potentially deprive a network element from much of its capacity, or significantly reduce its service quality, while evading detection by consuming an unsuspicious, small fraction of that element's hijacked capacity. This type of attack stands in sharp… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 109 CITATIONS, ESTIMATED 26% COVERAGE

A Study of Very Short Intermittent DDoS Attacks on the Performance of Web Services in Clouds

Huasong Shan
  • 2017
VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Tail Attacks on Web Applications

  • ACM Conference on Computer and Communications Security
  • 2017
VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

On a Mathematical Model for Low-Rate Shrew DDoS

  • IEEE Transactions on Information Forensics and Security
  • 2014
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks

  • IEEE Transactions on Computers
  • 2013
VIEW 6 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks

  • 2009 Eighth International Conference on Networks
  • 2009
VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Reduction of Quality (RoQ) attacks on structured peer-to-peer networks

  • 2009 IEEE International Symposium on Parallel & Distributed Processing
  • 2009
VIEW 5 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks

  • IEEE INFOCOM 2008 - The 27th Conference on Computer Communications
  • 2008
VIEW 6 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Fidelity of network simulation and emulation: A case study of TCP-targeted denial of service attacks

  • ACM Trans. Model. Comput. Simul.
  • 2008
VIEW 7 EXCERPTS
CITES METHODS, RESULTS & BACKGROUND
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2004
2018

CITATION STATISTICS

  • 15 Highly Influenced Citations

  • Averaged 5 Citations per year over the last 3 years

References

Publications referenced by this paper.
SHOWING 1-10 OF 28 REFERENCES

Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants

Aleksandar Kuzmanovic, Edward W. Knightly
  • SIGCOMM
  • 2003
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Exploiting the Transients of Adaptation for RoQ Attacks on Internet Resources

M. Guirguis, A. Bestavros, I. Matta
  • Tech Report BUCS-TR-2004-005, CS Dept, Boston University
  • 2004
VIEW 1 EXCERPT

IETF Draft: HighSpeed TCP for Large Congestion Windows

S. Floyd
  • draft-ietf-tsvwg-highspeed-01.txt
  • 2003
VIEW 1 EXCERPT

How to 0wn the Internet in Your Spare Time

S. Staniford, V. Paxson, N. Weaver
  • USENIX Security Symposium
  • 2002
VIEW 1 EXCERPT

A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms

J. Mirkovic, J. Martin, P. Reiher
  • Tech Report 020018,
  • 2001
VIEW 1 EXCERPT

Similar Papers

Loading similar papers…