首页> 外文会议>Future challenges in security and privacy for academia and industry >TCP Ack Storm DoS Attacks Raz Abramov and Amir Herzberg
【24h】

TCP Ack Storm DoS Attacks Raz Abramov and Amir Herzberg

机译:TCP Ack风暴DoS攻击Raz Abramov和Amir Herzberg

获取原文
获取原文并翻译 | 示例

摘要

We present Ack-storm DoS attacks, a new family of DoS attacks exploiting a subtle design flaw in the core TCP specifications. The attacks can be launched by a very weak MitM attacker, which can only eavesdrop occasionally and spoof packets (a Weakling in the Middle (WitM)). The attacks can reach theoretically unlimited amplification; we measured amplification of over 400,000 against popular websites before aborting our trial attack. Ack storm DoS attacks are practical. In fact, they are easy to deploy in large scale, especially considering the widespread availability of open wireless networks, allowing an attacker easy WitM abilities to thousands of connections. Storm attacks can be launched against the access network, e.g. blocking address to proxy web server, against web sites, or against the Internet backbone. Storm attacks work against TLS/SSL connections just as well as against unprotected TCP connections, but fails against IPsec or link-layer encrypted connections. We show that Ack-storm DoS attacks can be easily prevented, by a simple fix to TCP, in either client or server, or using a packet-filtering firewall.
机译:我们介绍了Ack-storm DoS攻击,这是一个利用核心TCP规范中的细微设计缺陷的新型DoS攻击系列。攻击可以由非常弱小的MitM攻击者发起,该攻击者只能偶尔窃听并欺骗数据包(中间漏洞(WitM))。从理论上讲,这些攻击可以无限放大;在中止我们的试验攻击之前,我们对热门网站进行了超过40万次的放大测试。确认风暴DoS攻击非常实用。实际上,它们易于大规模部署,特别是考虑到开放无线网络的广泛可用性,使得攻击者可以轻松地将WitM功能连接到成千上万个连接。可以针对接入网络发起风暴攻击,例如阻止针对代理Web服务器,网站或Internet骨干网的地址。风暴攻击既可以针对TLS / SSL连接也可以针对不受保护的TCP连接,但是对于IPsec或链路层加密连接均无效。我们表明,通过在客户端或服务器中对TCP进行简单修复,或使用包过滤防火墙,可以轻松地防止Ack-storm DoS攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号