首页> 外文期刊>Computers & Security >Data sequence signal manipulation in multipath TCP (MPTCP): The vulnerability, attack and its detection
【24h】

Data sequence signal manipulation in multipath TCP (MPTCP): The vulnerability, attack and its detection

机译:多径TCP(MPTCP)中的数据序列信号操作:漏洞,攻击及其检测

获取原文
获取原文并翻译 | 示例

摘要

Multipath Transmission Control Protocol (MPTCP) is an innovative next-generation transport protocol standardized by the Internet Engineering Task Force (IETF) to overcome the single path limitation of the Transmission Control Protocol (TCP). MPTCP augments TCP with a new set of signaling options for seamless transmission and reception of application data across multiple interlinked TCP connections called subflows. In this paper, we focus on a new security concern associated with the signal exchanging process of MPTCP. To the best of our knowledge, for the first time, this paper exposes that MPTCP signal exchange scheme is vulnerable to a sophisticated packet spoofing technique, which we name as Data Sequence Signal (DSS) manipulation. We implement the vulnerability, create attack scenarios in Linux Kernel and conduct experiments over emulated testbed to demonstrate the existence of the vulnerability and means of exploiting it for powerful attacks. Our results show that DSS manipulation can be tactically exploited, on top of TCP optimistic ACKing, to generate non-responsive traffic like Denial-of-Service (DoS) attack flood. Particularly, we demonstrate two new adverse scenarios, where a MPTCP sender is forced to: (a) transmit at a rate significantly higher than the bottleneck link bandwidth, and (b) induce high intensity and harmful packet bursts at line-rate called Maliciously-induced-Bursts (MiBs). We also show that the non-responsive traffic resulting from the attack can suppress genuine congestion controlled traffic to the extent of causing DoS attack. We capture and analyze the dynamics of important MPTCP parameters, like send buffer occupancy of meta and subflow sockets, congestion window and flightsize to highlight the attack impact. DSS manipulation originates from a fundamental protocol design limitation rather than from any implementation flaw. We also propose a novel technique called data sequence map skipping for detection and countermeasure against DSS manipulation based attacks.
机译:多径传输控制协议(MPTCP)是由互联网工程任务组(IETF)标准化的创新的下一代传输协议,以克服传输控制协议(TCP)的单路径限制。 MPTCP为TCP为TCP具有一组新的信令选项,可在称为子流的多个互通的TCP连接跨多个互通的TCP连接进行无缝传输和接收应用程序数据。在本文中,我们专注于与MPTCP的信号交换过程相关的新安全问题。据我们所知,本文首次出示MPTCP信号交换方案容易受到复杂的包欺骗技术的影响,我们将其名称为数据序列信号(DSS)操作。我们实现了漏洞,在Linux内核中创建攻击场景,并在模拟测试设备上进行实验,以证明漏洞的存在和利用强大的攻击的方法。我们的结果表明,DSS操作可以在TCP乐观态度之上进行战术剥削,以产生拒绝服务(DOS)攻击洪水的非响应流量。特别是,我们展示了两个新的不利情景,其中MPTCP发件人被迫:(a)以显着高于瓶颈链路带宽的速率传输,并且(b)引起了恶意称呼的线速率的高强度和有害分组突发 - 诱导突发(MIBS)。我们还表明,由于攻击产生的非响应流量可以抑制正版拥堵流量,以导致DOS攻击的程度。我们捕获和分析重要的MPTCP参数的动态,如Meta和Subflow插座,拥塞窗口和Flysize的发送缓冲区占用,以突出攻击影响。 DSS操作源自基本协议设计限制而不是从任何实施缺陷。我们还提出了一种新颖的技术,称为数据序列映射跳过的用于对基于DSS操纵的攻击的检测和对策。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号