DoS Attacks on Real-Time Media through Indirect Contention-in-Hosts

被引:1
|
作者
Poroor, Jayaraj [1 ]
Jayaraman, Bharat [2 ]
机构
[1] Amrita Univ, Ctr Cyber Secur, Coimbatore, Tamil Nadu, India
[2] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
关键词
Quality of service; Media; Real time systems; Computer crime; Protocols; Data mining; QoS; denial of service; indirect contention-in-hosts; protocol stack; quality of service; metrics; real-time media; multimedia; network security; unwanted traffic;
D O I
10.1109/MIC.2009.99
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Quality of service (QoS) is critical for delivering real-time media services (RTMSs). The authors identify a new class of denial-of-service attacks against RTMSs - indirect contention-in-hosts (ICiH). Here, attackers attempt to indirectly degrade RTMS QoS by directing packets at other concurrent services, thereby inducing resource contention between RTMS packets and attack packets in the protocol stack. To analyze such attacks, the authors' operation-trace analysis method formalizes the notion of contention among concurrent services and develops several metrics to quantify ICiH's effects.
引用
收藏
页码:22 / 30
页数:9
相关论文
共 50 条
  • [31] Collaborative Information Seeking through Social Media Updates in Real-Time
    Bhat, Karthik
    Moreno, Andres
    Best, Michael L.
    [J]. CHIIR'18: PROCEEDINGS OF THE 2018 CONFERENCE ON HUMAN INFORMATION INTERACTION & RETRIEVAL, 2018, : 221 - 224
  • [32] Managing Real-Time Media Flows through a Flow State Exchange
    Islam, Safiqul
    Welzl, Michael
    Hayes, David
    Gjessing, Stein
    [J]. NOMS 2016 - 2016 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2016, : 112 - 120
  • [33] Mathematical approximation for real-time lighting rendering through participating media
    Lecocq, P
    Michelin, S
    Arquès, D
    Kemeny, A
    [J]. EIGHTH PACIFIC CONFERENCE ON COMPUTER GRAPHICS AND APPLICATIONS, PROCEEDINGS, 2000, : 400 - 401
  • [34] Scene independent real-time indirect illumination
    Frisvad, JR
    Frisvad, RR
    Christensen, NJ
    Falster, P
    [J]. COMPUTER GRAPHICS INTERNATIONAL 2005, PROCEEDINGS, 2005, : 185 - +
  • [35] Real-time properties of indirect recursive procedures
    Blieberger, J
    [J]. INFORMATION AND COMPUTATION, 2001, 171 (02) : 156 - 182
  • [36] Enhancing IoT device security: CNN-SVM hybrid approach for real-time detection of DoS and DDoS attacks
    Al-Na'Amneh, Qais
    Aljaidi, Mohammad
    Nasayreh, Ahmad
    Gharaibeh, Hasan
    Al Mamlook, Rabia Emhamed
    Jaradat, Ameera S.
    Alsarhan, Ayoub
    Samara, Ghassan
    [J]. Journal of Intelligent Systems, 2024, 33 (01)
  • [37] Artificial Intelligence Based Real Time Packet Analysing to Detect DOS Attacks
    Makineedi, Sai Harsh
    Chowdhury, Soumya
    Manivannan, Vaidhehi
    [J]. THIRD INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND CAPSULE NETWORKS (ICIPCN 2022), 2022, 514 : 305 - 320
  • [38] VoiceBlock: Privacy through Real-Time Adversarial Attacks with Audio-to-Audio Models
    O'Reilly, Patrick
    Bugler, Andreas
    Bhandari, Keshav
    Morrison, Max
    Pardo, Bryan
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 35 (NEURIPS 2022), 2022,
  • [39] A NEW MULTIPROCESSING TECHNIQUE BRINGS DOS TO REAL-TIME CONTROL
    DAVIDSON, R
    [J]. COMPUTER DESIGN, 1992, 31 (02): : 96 - 96
  • [40] Processing social media in real-time
    Spina, Damiano
    Zubiaga, Arkaitz
    Sheth, Amit
    Strohmaier, Markus
    [J]. INFORMATION PROCESSING & MANAGEMENT, 2019, 56 (03) : 1081 - 1083