Fundamental Limits of Volume-based Network DoS Attacks
-
Published:2019-12-17
Issue:3
Volume:3
Page:1-36
-
ISSN:2476-1249
-
Container-title:Proceedings of the ACM on Measurement and Analysis of Computing Systems
-
language:en
-
Short-container-title:Proc. ACM Meas. Anal. Comput. Syst.
Author:
Fu Xinzhe1,
Modiano Eytan1
Affiliation:
1. Massachusetts Institute of Technology, Cambridge, MA, USA
Abstract
Volume-based network denial-of-service (DoS) attacks refer to a class of cyber attacks where an adversary seeks to block user traffic from service by sending adversarial traffic that reduces the available user capacity. In this paper, we explore the fundamental limits of volume-based network DoS attacks by studying the minimum required rate of adversarial traffic and investigating optimal attack strategies. We start our analysis with single-hop networks where user traffic is routed to servers following the Join-the-Shortest-Queue (JSQ) rule. Given the service rates of servers and arrival rates of user traffic, we first characterize the feasibility region of the attack and show that the attack is feasible if and only if the rate of the adversarial traffic lies in the region. We then design an attack strategy that is (i).optimal: it guarantees the success of the attack whenever the adversarial traffic rate lies in the feasibility region and (ii).oblivious: it does not rely on knowledge of service rates or user traffic rates. Finally, we extend our results on the feasibility region of the attack and the optimal attack strategy to multi-hop networks that employ Back-pressure (Max-Weight) routing. At a higher level, this paper addresses a class of dual problems of stochastic network stability, i.e., how to optimally de-stabilize a network.
Funder
Defense Threat Reduction Agency
National Science Foundation
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Networks and Communications,Hardware and Architecture,Safety, Risk, Reliability and Quality,Computer Science (miscellaneous)
Reference30 articles.
1. urlhttps://www.msspalert.com/cybersecurity-research/kaspersky-lab-study-average-cost-of-enterprise-ddos-attack-totals-2m/ urlhttps://www.msspalert.com/cybersecurity-research/kaspersky-lab-study-average-cost-of-enterprise-ddos-attack-totals-2m/
2. urlhttps://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/ urlhttps://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/
3. DDoS in the IoT: Mirai and Other Botnets
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. SurgeProtector;Proceedings of the ACM SIGCOMM 2022 Conference;2022-08-22
2. Deterrence of Intelligent DDoS via Multi-Hop Traffic Divergence;Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security;2021-11-12
3. Fundamental scaling laws of covert DDoS attacks;Performance Evaluation;2021-11
4. On the use of generalized entropy formulas in detection of denial‐of‐service attacks;Security and Privacy;2020-10-13