...
首页> 外文期刊>IEEE communications letters >On remote exploitation of TCP sender for low-rate flooding denial-of-service attack
【24h】

On remote exploitation of TCP sender for low-rate flooding denial-of-service attack

机译:关于TCP发送方的远程利用以进行低速率泛洪拒绝服务攻击

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

This letter shows a potentially harmful scenario named Induced-shrew attack in which a malicious TCP receiver remotely controls the transmission rate and pattern of a TCP sender to exploit it as a flood source for launching low-rate Denial-of-Service (DoS) attacks. Through simulation, proof-ofconcept implementation and experimentation in testbed and realworld Internet paths, we demonstrate that standard implementation of TCP senders can be exploited as flood sources for low-rate DoS attacks without compromising them. We describe the nature of the underlying vulnerability and discuss possible countermeasures against the Induced-shrew.
机译:这封信显示了一种潜在的有害情况,称为“诱骗攻击”,其中恶意TCP接收者远程控制TCP发送者的传输速率和模式,以将其用作发起低速率拒绝服务(DoS)攻击的泛滥源。 。通过在测试平台和真实世界的Internet路径上进行仿真,概念验证实施和实验,我们证明了TCP发送方的标准实现可被用作低速率DoS攻击的泛滥源,而不会损害它们。我们描述了潜在漏洞的性质,并讨论了针对诱发sh的可能对策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号