首页> 外文会议>International Conferences on Networking >On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks
【24h】

On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks

机译:关于硬件哈希表到复杂攻击的漏洞

获取原文

摘要

Peacock and Cuckoo hashing schemes are currently the most studied hash implementations for hardware network systems (such as NIDS, Firewalls, etc.). In this work we evaluate their vulnerability to sophisticated complexity Denial of Service (DoS) attacks. We show that an attacker can use insertion of carefully selected keys to hit the Peacock and Cuckoo hashing schemes at their weakest points. For the Peacock Hashing, we show that after the attacker fills up only a fraction (typically 5% - 10%) of the buckets, the table completely loses its ability to handle collisions, causing the discard rate (of new keys) to increase dramatically (100-1, 800 times higher). For the Cuckoo Hashing, we show an attack that can impose on the system an excessive number of memory accesses and degrade its performance. We analyze the vulnerability of the system as a function of the critical parameters and provide simulations results as well.
机译:孔雀和杜鹃散列方案目前是硬件网络系统中最多的散列实现(如NID,防火墙等)。在这项工作中,我们评估他们对复杂复杂性拒绝服务(DOS)攻击的复杂复杂性的脆弱性。我们展示攻击者可以使用仔细选择的钥匙插入孔雀和杜鹃散列方案在他们最弱的点。对于孔雀散,我们表明,在攻击者只填充铲斗的一小部分(通常为5% - 10%)后,该表完全失去了处理碰撞的能力,导致丢弃速率(新键)急剧增加(100-1,高800倍)。对于Cuckoo Hashing,我们展示了一种攻击,可以施加系统的过多数量的内存访问并降低其性能。我们将系统的漏洞分析为关键参数的函数,并提供模拟结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号