首页> 外文会议>International Conference on Computing, Networking and Communications >Preventing UDP Flooding Amplification Attacks with Weak Authentication
【24h】

Preventing UDP Flooding Amplification Attacks with Weak Authentication

机译:使用弱认证防止UDP泛洪放大攻击

获取原文

摘要

An attacker wishing to flood a network with excess amounts of network traffic may send UDP packets with a spoofed IP source address corresponding to the target network. In many cases servers then amplify the attack by replying to the target network with more data than was sent by the attacker. This kind of attack has been successful in the past using both DNS and NTP servers. The AllNet protocol has been designed to deliver data over UDP as well as other media. Once an AllNet peer receives a suitable UDP packet, it records the sender's IP address and begins to forward AllNet data to that address. This is a legitimate form of traffic amplification, with one packet being used to request that a limited number of other packets (currently 100) be sent to this IP address. To keep attackers from using AllNet peers for flooding amplification attacks, AllNet peers require potential contacts to return a bitstring that was sent to that specific IP address. In this way, legitimate contacts can receive and return the bitstring and start receiving their data. In contrast, attackers who spoof their IP address and do not receive the bitstring, are unable to direct amplified traffic to other networks. This very weak form of authentication, conceptually related to TCP SYN cookies, only verifies that the packet comes from a system that is able to receive packets sent to that specific IP address. Such weak authentication is sufficient to prevent flooding amplification attacks.
机译:希望向网络中发送过多网络流量的攻击者可能会发送带有与目标网络相对应的欺骗性IP源地址的UDP数据包。在许多情况下,服务器通过使用比攻击者发送的数据更多的数据答复目标网络来扩大攻击范围。过去使用DNS和NTP服务器都成功进行了这种攻击。 AllNet协议旨在通过UDP以及其他媒体传送数据。一旦一个AllNet对等方收到一个合适的UDP数据包,它将记录发送方的IP地址,并开始将AllNet数据转发到该地址。这是流量放大的一种合法形式,其中一个数据包用于请求将有限数量的其他数据包(当前为100个)发送到此IP地址。为了防止攻击者使用AllNet对等点进行泛洪放大攻击,AllNet对等点要求潜在的联系人返回发送到该特定IP地址的位串。通过这种方式,合法联系人可以接收并返回该位串,并开始接收其数据。相比之下,欺骗其IP地址却未接收到位串的攻击者无法将放大的流量定向到其他网络。从概念上讲,这种非常弱的身份验证形式与TCP SYN cookie有关,仅验证数据包来自能够接收发送到该特定IP地址的数据包的系统。这种弱认证足以防止泛洪放大攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号