Modeling and Mitigating the Coremelt Attack

被引:0
|
作者
Yang, Guosong [1 ]
Hosseini, Hossein [2 ]
Sahabandu, Dinuka [2 ]
Clark, Andrew [3 ]
Hespanha, Joao [1 ]
Poovendran, Radha [2 ]
机构
[1] Univ Calif Santa Barbara, Dept Elect & Comp Engn, Santa Barbara, CA 93106 USA
[2] Univ Washington, Dept Elect Engn, Seattle, WA 98195 USA
[3] Worcester Polytech Inst, Dept Elect & Comp Engn, Worcester, MA 01609 USA
基金
美国国家科学基金会;
关键词
CONGESTION; MECHANISMS; DDOS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies the Coremelt attack, a link flooding Distributed Denial of Service attack that exhausts the bandwidth at a core network link using low-intensity traffic flows between subverted machines. A dynamical system model is formulated for analyzing the effect of Coremelt attack on a single-link Transmission Control Protocol (TCP) network and developing mitigation methods. For the case with a limited number of subverted sources, a modified TCP algorithm is developed for the attackers to achieve a desired congestion level. A mitigation method is proposed to improve the link usage of legitimate users when the link is under attack. The network performance under different attack and mitigation scenarios is illustrated through simulation results.
引用
下载
收藏
页码:3410 / 3416
页数:7
相关论文
共 50 条
  • [1] The Coremelt Attack
    Studer, Ahren
    Perrig, Adrian
    COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS, 2009, 5789 : 37 - 52
  • [2] Mitigating JTAG as an Attack Surface
    Sguigna, Alan
    2019 IEEE AUTOTESTCON, 2019,
  • [3] Mitigating Poisoning Attack in Federated Learning
    Uprety, Aashma
    Rawat, Danda B.
    2021 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI 2021), 2021,
  • [4] Retpoline Technique for Mitigating Spectre Attack
    Kadir, MohdFadzil Abdul
    Kee, Wong Jin
    Ab Wahab, Fauziah
    Bharun, Ahmad Faisal Amri Abidin
    Mohamed, Mohamad Afendee
    Zakaria, Aznida Hayati
    2019 6TH INTERNATIONAL CONFERENCE ON ELECTRICAL AND ELECTRONICS ENGINEERING (ICEEE 2019), 2019, : 96 - 101
  • [5] An intelligent model for mitigating the attack effects
    Sobh, TS
    Hamed, EM
    ICEEC'04: 2004 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTER ENGINEERING, PROCEEDINGS, 2004, : 165 - 168
  • [6] Robustness of RED in Mitigating LDoS Attack
    Zhang, Jing
    Hu, Huaping
    Liu, Bo
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (05): : 1085 - 1100
  • [7] Mitigating the desynchronisation attack in multiserver environment
    Jan, Saeed Ullah
    Qayum, Fawad
    IET COMMUNICATIONS, 2020, 14 (13) : 2210 - 2221
  • [8] Mitigating content caching attack in NDN
    Ruan Z.
    Luo H.
    Lin W.
    Wang J.
    Ruan, Zhiqiang (rzq_911@163.com), 2018, Tech Science Press (56): : 483 - 499
  • [9] Mitigating SAT Attack on Logic Locking
    Xie, Yang
    Srivastava, Ankur
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 : 127 - 146
  • [10] Chaos Computing for Mitigating Side Channel Attack
    Majumder, Md. Badruddoja
    Hasan, Md Sam
    Uddin, Mesbah
    Rose, Garrett. S.
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2018, : 143 - 146