OpenBU

Exploiting the Transients of Adaptation for RoQ Attacks on Internet Resources

OpenBU

Show simple item record

dc.contributor.author Guiguis, Mina en_US
dc.contributor.author Bestavros, Azer en_US
dc.contributor.author Matta, Ibrahim en_US
dc.date.accessioned 2011-10-20T04:19:13Z
dc.date.available 2011-10-20T04:19:13Z
dc.date.issued 2004-01-30 en_US
dc.identifier.uri http://hdl.handle.net/2144/1533
dc.description.abstract In this paper, we expose an unorthodox adversarial attack that exploits the transients of a system's adaptive behavior, as opposed to its limited steady-state capacity. We show that a well orchestrated attack could introduce significant inefficiencies that could potentially deprive a network element from much of its capacity, or significantly reduce its service quality, while evading detection by consuming an unsuspicious, small fraction of that element's hijacked capacity. This type of attack stands in sharp contrast to traditional brute-force, sustained high-rate DoS attacks, as well as recently proposed attacks that exploit specific protocol settings such as TCP timeouts. We exemplify what we term as Reduction of Quality (RoQ) attacks by exposing the vulnerabilities of common adaptation mechanisms. We develop control-theoretic models and associated metrics to quantify these vulnerabilities. We present numerical and simulation results, which we validate with observations from real Internet experiments. Our findings motivate the need for the development of adaptation mechanisms that are resilient to these new forms of attacks. en_US
dc.language.iso en_US en_US
dc.publisher Boston University Computer Science Department en_US
dc.relation.ispartofseries BUCS Technical Reports;BUCS-TR-2004-005 en_US
dc.title Exploiting the Transients of Adaptation for RoQ Attacks on Internet Resources en_US
dc.type Technical Report en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search OpenBU


Browse

Deposit Materials

Statistics