Internet Scale DoS Attacks
Abstract
Internet scale DoS attack is a new evolution of conventional flooding DoS attack with the inspiration of shutting down the Internet due to its vulnerable infrastructure. Past DoS attacks directly attacked the victim, usually a single host. Consequently, defences were designed to identify the excessive traffic or filter illegitimate traffic. From the early two thousand, Internet scale DoS attacks started to appear. They aimed to disable highly connected routers or large links with a legitimate action in the form of low-rate traffic or high-rate wanted traffic with protocol messages that are unfiltered by congestion control. The latter can be more devastating due to its global impact therefore attracts the attention of researchers and some applications are now available. The goal of this paper is to introduce Internet scale DoS attack and to survey its theoretical underpinnings and experimental applications. Several attacking techniques will be presented, as well as their effects on the connectivity of the Internet. A comparison will be carried out among them to expose their pros and cons in order to study the possibility of their integration via usage of several botnets for destroying the Internet connectivity. Our discussion aims to clarify new directions that DoS, DoS defence and Internet design research can follow.
Keywords
References
- M. Handley and E. Rescorla, “Internet Denial-of-Service Considerations,” RFC 4732, 2006.
- (2000) Yahoo on Trail of Site Hackers. [Online]. Available: http://www.wired.com/techbiz/media/news/2000/02/34221
- (2002) Powerful attack cripples majority of key Internet computers. [Online]. Available: http://www.securityfocus.com/news/1400
- (2010) Operation Payback cripples MasterCard site in revenge for WikiLeaks ban. [Online]. Available: http://www.theguardian.com/media/2010/dec/08/operation-payback-mastercard-website-wikileaks
- (2013) DDoS: Lessons from Phase 2 Attacks. [Online]. Available: http://www.bankinfosecurity.com/ddos-attacks-lessons-from-phase-2-a-5420/op-1
- H. F. Lipson, “Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy,” CERT Coordination Center, 2002.
- J. Mirkovic and P. Reiher, “A Taxonomy of DDoS Attack and DDoS Defense Mechanisms,” in Proc. ACM SIGCOMM, 2004.
- N. Long and R. Thomas, “Trends in Denial of Service Attack Technology,” CERT Coordination Center, 2001.
Details
Primary Language
English
Subjects
-
Journal Section
-
Publication Date
March 30, 2015
Submission Date
October 23, 2014
Acceptance Date
-
Published in Issue
Year 2015 Volume: 3 Number: 2
Cited By
A survey and taxonomy of DoS attacks in cloud computing
Security and Communication Networks
https://doi.org/10.1002/sec.1539