首页> 外文会议>Distributed Computing Systems, 2009. ICDCS '09 >The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack
【24h】

The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack

机译:驯服rew:缓解低速率TCP攻击

获取原文

摘要

A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP's retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner. While such an attack can significantly degrade the performance of all TCP-based protocols and services including Internet routing (e.g., BGP), no existing scheme clearly solves the problem in real network scenarios. In this paper, we propose a simple protection mechanism, called SAP (Shrew Attack Protection), for defending against a Shrew attack. Rather than attempting to track and isolate Shrew attackers, SAP identifies TCP victims by monitoring their drop rates and preferentially admits those packets from victims with high drop rates to the output queue. This is to ensure that well-behaved TCP sessions can retain their bandwidth shares. Our simulations indicate that under a Shrew attack, SAP can prevent TCP sessions from closing, and effectively enable TCP flows to maintain high throughput. SAP is a destination-port-based mechanism and requires only a small number of counters to find potential victims, which makes SAP readily implementable on top of existing router mechanisms.
机译:什鲁夫攻击使用精心设计的低速率突发来利用TCP的重传超时机制,它可以以隐秘的方式限制TCP流的带宽。尽管这种攻击会大大降低包括互联网路由(例如BGP)在内的所有基于TCP的协议和服务的性能,但没有任何现有方案可以明确解决实际网络场景中的问题。在本文中,我们提出了一种简单的保护机制,称为SAP(Shrew Attack Protection),用于防御Shrew攻击。 SAP不会尝试跟踪和隔离Shrew攻击者,而是通过监视TCP的丢弃率来识别TCP受害者,并优先将丢弃率高的受害者的数据包接收到输出队列中。这是为了确保行为良好的TCP会话可以保留其带宽份额。我们的模拟表明,在Shrew攻击下,SAP可以防止TCP会话关闭,并有效地使TCP流保持高吞吐量。 SAP是基于目标端口的机制,只需少量计数器即可找到潜在的受害者,这使得SAP可以在现有路由器机制之上轻松实现。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号