首页> 外文会议>2012 International Conferece For Internet Technology And Secured Transactions. >Feedback manipulation flooding attack: Feasibility evaluation and impact quantification on Stream Control Transmission Protocol
【24h】

Feedback manipulation flooding attack: Feasibility evaluation and impact quantification on Stream Control Transmission Protocol

机译:反馈操纵泛洪攻击:流控制传输协议的可行性评估和影响量化

获取原文
获取原文并翻译 | 示例

摘要

Stream Control Transmission Protocol (SCTP) is a general purpose and relatively new transport layer protocol with several unique features. This paper highlights the concept of feedback protocol and identifies SCTP as a protocol operating in a closed-loop feedback manner. We conduct an in-depth security analysis of closed-loop feedback operation of SCTP congestion control and present a new attack scenario called feedback manipulation flooding attack (FMFA). We show that standard SCTP senders can be remotely exploited for generation of powerful and sustained Denial-of-Service attack flood by tactically manipulating feedback messages. To ascertain the attack feasibility and its potential impact, we simulate the FMFA scenario using one of the globally well-accepted network simulators (ns2). We also compare the feedback manipulation flooding attack with conventional brute-force flooding attacks and identify some of its exclusive characteristics. Further, we implement the FMFA attack scenario in Linux kernel and present real-world experimental results over the Internet to validate our simulation results.
机译:流控制传输协议(SCTP)是一种通用且相对较新的传输层协议,具有几个独特的功能。本文重点介绍了反馈协议的概念,并将SCTP识别为以闭环反馈方式运行的协议。我们对SCTP拥塞控制的闭环反馈操作进行了深入的安全分析,并提出了一种新的攻击场景,称为反馈操纵泛洪攻击(FMFA)。我们展示了可以通过策略性地操纵反馈消息来远程利用标准SCTP发送者,以生成强大而持续的拒绝服务攻击泛滥。为了确定攻击的可行性及其潜在影响,我们使用全球公认的网络模拟器之一(ns2)模拟FMFA场景。我们还将反馈操纵泛洪攻击与常规的暴力泛洪攻击进行了比较,并确定了其一些独有的特征。此外,我们在Linux内核中实现了FMFA攻击方案,并通过Internet展示了真实的实验结果以验证我们的仿真结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号