Denial-of-Service Shrew Attacks

Size: px
Start display at page:

Download "Denial-of-Service Shrew Attacks"

Transcription

1 Denial-of-Service Shrew Attacks Bhuvana Mahalingam 1. Introduction A Denial of Service Attack is defined as An incident in which a user or organization is deprived of the services of a resource they would normally expect to have. In a broad sense there are two types of DoS attacks: Operating System attacks, which target bugs in specific operating systems and can be fixed with patches, and Networking attacks, which exploit inherent limitations of networking and may require firewall protection. Examples of networking DoS attacks include TCP SYN attacks that consume protocol data structures on the server operating system; ICMP directed broadcasts that direct a broadcast address to send a flood of ICMP replies to a target host thereby overwhelming it; and DNS flood attacks that use specific weaknesses in DNS protocols to generate high volumes of traffic directed at a targeted victim. All of the above are high rate attacks that could be detected. The focus of this project is on a class of low rate DoS attacks called shrew attacks, which attempt to deny bandwidth to TCP flows while sending at sufficiently low average rate to elude detection by counter DoS mechanisms. Shrew attacks were defined in [KK03]. The basic idea behind shrew attacks is to exploit TCP s retransmission time out mechanism. In particular, it has been suggested [AP99] that the minimum value of retransmission time out (RTO) should be set to atleast 1 sec. Since the vast majority of TCP flows have RTTs in the range of 10 to 100 ms, their initial time out values tend to be the same, namely 1 sec. The shrew attack sends a square wave of duration roughly 1 to 2 RTTs and a period greater than 1 sec. It is argued in [KK03] that the TCP flows synchronise with the attacker and repeatedly incur timeouts with period of 1 sec and thus obtain almost zero throughput. Since the burst length of the shrew attack is considerably less than its period the average rate of the shrew attack is low, thus potentially eluding detection. 2. Motivation DoS attacks are quite common these days. They are also very damaging. Even big companies sites like Yahoo and Amazon have been attacked. Recently, MyDoom was launched to cripple SCO Group s web site and caused havoc worth billions of dollars. Fortunately, such high rate attacks are difficult to launch since they require a huge client base roughly in the order of several tens of thousands of zombie clients. Furthermore, they are easy to detect because one can simply measure the rate of attack at the routers which would be noticeably more than regular traffic. Thus, it makes it easy for counter measures to be taken. Security is extremely important in the Internet considering it has become part and parcel of our lives. Not only is the task of finding counter measures challenging, but identifying new kinds of attacks is also important to make the infrastructure robust. 1

2 In this project, we study low rate attacks that are difficult to detect. There are no known mechanisms to counter such attacks. As a result, the potential for damage is significant, which makes the problem even more important to study. 3. Previous Work In this section, we discuss in detail the results of [KK03] which form the basis of our project. RTT calculation TCP detects loss either via timeout from non-receipt of ACKs or by receipt of three duplicate ACKs. When a packet has not been acknowledged within the time out period (RTO) and less than 3 dup ACKs have been received TCP times out. TCP periodically measures the RTT of packets and sets its RTO accordingly. More precisely, RTO is calculated as follows. RTTVAR = (1-5779$5 _6577 R, SRTT = ( RTO = max (minrto, SRTT + max (G, 4RTTVAR)). In the above, R is the measured RTT, G is the clock granularity ang DUHW\SLFDOO\VHWWR and ¼ respectively. When the first measurement R is made, then SRTT = R, RTTVAR = R /2 and RTO = SRTT + max (G, 4RTTVAR). [AP99] have recommended that minrto be set to 1 sec. As a result, the calculation of RTO indicates that if the second term is less than minrto, then RTO would be set to 1 sec. This is mostly the case since RTTs tend to range between 10 s of ms and a few 100 s of ms. The shrew attack exploits precisely this aspect of RTO calculation. Model and analysis of shrew attacks Shrew attack is modeled by a square wave in which the attacker transmits bursts of duration L at rate R in a deterministic on-off pattern that has period T. When the rate R coupled with existing traffic becomes greater than the link capacity loss is incurred. By setting the duration L to be more than the RTT of the flows and period T to be slightly more than minrto, TCP flows can be forced to repeatedly time out, thus obtaining virtually zero throughput. Since L is typically set much less than T, the average rate of the shrew attack, given by RL/T, is very low. In [KK03], the authors give an upper bound on the normalized throughput achieved in terms of the values of minrto and T, assuming certain conditions. For the shrew attack to be effective against a particular TCP flow, the burst duration L needs to be more than the RTT of the flow. Therefore, in general, the above described shrew attack is more effective against low RTT flows than against high RTT flows. In [KK03], the authors give a formula that measures the impact on low RTTs as opposed to high RTTs. 2

3 Other results By analyzing the instantaneous bottleneck-queue behavior, the authors derive that an optimal shrew attack is a double-rate wave which is a variant of the square wave. However, a square wave approximates the double-rate attack fairly well. One could ask whether Active Queue Management can help thwart shrew attacks. Unfortunately, the authors have experimentally shown that even though RED works well in avoiding global synchronization, under the influence of DoS attacks, RED is helpless since all TCP flows with low RTTs synchronize with the period of the attacker. Experimental evidence shows that effective shrew attacks can come from remote sites as well as nearby LANs. Counter DOS techniques [KK03] explore two kinds of mitigation systems against DoS attacks: router-assisted mechanisms and end-point minrto randomization. In the router-assisted mechanism, they study if there are measures to detect the low-rate DoS attacks. RED-PD is used to detect flows with high rates and drop packets belonging to these flows. Unfortunately, if rates are measured over small timescales, even normal TCP flows could be falsely considered malicious. On the other hand, if rates are measured over large timescales, shrew attacks could be missed. So, it appears that RED-PD is not an effective counter measure against shrew attacks. For the end-point minrto randomization, the authors consider selecting minrto uniformly distributed in the range (a,b). They prove that the normalized throughput is at most n/(n+1)* (b-a)/b. Thus, by increasing the range (a,b) one can potentially counter the shrew attack. However, the authors note that decreasing a could significantly degrade TCP throughput during periods of heavy congestion while increasing b could degrade the throughput of short lived flows. 4. Proposed Work Our plan was to reexamine the experiments conducted in the [KK03] paper in the following ways: 1. Study impact of clock granularities. 2. Impact of shrew attacks on TCP Vegas 3. Impact of reducing minrto to less than 1 sec. 4. Study if randomizing the scheduling of packets and buffer management will counter the attacks. In particular, can fair queueing at the router alleviate the problem? 5. Randomizing the initial timeout at different TCP sources 6. Effect of distance between attacker and attacked router 5. Simulation Set up I used ns-2.1b9a for all my experiments. The topology of the network looks like below. 3

4 0 4Mbps 4Mbps Mbps For most of the experiments, I used one TCP flow and one DoS flow. The TCP flow has source 0 and destination 3 while the DoS flow has source 1 and destination 3. As a result, the DoS attack is aimed at the queue in router 2. The bottleneck link is between nodes 2 and 3. Each link has a capacity of 4Mbps and latency of 10ms. The TCP flow was associated with an FTP application and used payload of size 460 bytes and a maximum window size 40 packets. Note that the bandwidth-delay product for the TCP connection equals 40 packets which is the maximum window size. Thus, if there were no other flows, then the TCP flow would get close to full throughput. The DoS attack is modelled by a square wave in which the attacker transmits bursts of duration L at rate R in a deterministic on-off pattern that has period T. We implemented this in ns by using a constant bit rate traffic generator that started and stopped periodically. The burst duration was set to L and the inter-burst segment (idle period) was set to T-L. The packet size was 46 bytes. 6. Findings 6.1. Impact of clock granularities The default clock granularity (in ns 2.1b9a) is 10ms. We studied if changing this default value smartly would reduce the impact of the shrew attack. We set the following parameters: Burst size of DoS attack is set to 100ms, inter-burst period of DoS attack is set to 1 sec. Figure 1 depicts the normalised throughput as the clock granularity changes. We notice that the throughput actually increases at 0.4 sec. One possible explanation for this is the following. The DoS attack has a period of 1.1 sec. Since the clock granularity is 0.4sec, when TCP flow has been attacked and it recovers from a timeout, it would only restart at multiples of 0.4 sec. In this case, the closest to minrto of 1 sec is 1.2 sec. While the DoS attack has begun at 1.1sec and ends at 1.2sec, TCP flow starts only at 1.2 sec and escapes the deadly DoS attack and reaches a peak normalised throughput of approximately 0.5. Since this only happens every alternate second the averaged throughput turns out to be about Figure 2 illustrates this behavior. 4

5 5

6 6.2. Impact of shrew attacks on TCP Vegas The authors of [KK03] did not study the impact of shrew attacks on TCP Vegas. We studied this issue and found that Vegas is even more adversely affected than Reno. As Figure 3 shows, the throughput of Vegas is significantly less than Reno. In particular, it is surprising that even when the inter-burst period is as large as 5 sec, Vegas only gains little more than 10% of the bandwidth capacity. To investigate this further, we studied the instantaneous throughput of Reno and Vegas as illustrated in Figure 4. Parameters for Figure 4 are burst size is 0.1 sec, minrto is set to its default of 1 sec and DoS inter-burst period is 3 sec. 6

7 We notice that timeout for Vegas after the first attack is 2 sec. Subsequently, it is following an exponential back off pattern where the timeouts are 4 and 8 sec. At time 20 sec, the Vegas flow gets back some of the throughput, but again enters a similar timeout sequence. This is hard to understand why Impact of reducing minrto to less than 1 sec. The key idea behind the [KK03] paper is the belief that the minrto should be set to 1 sec as suggested by [AP99]. Since a minrto of 1 sec has been consistently proposed as a good measure for avoiding TCP congestion, it is unlikely that a change in minrto would be implemented in TCP stacks any time soon. Nevertheless, in this project we explored to see if changing minrto would indeed have any effect against the shrew attack. Figure 5 depicts the study done with two values of minrto. The parameters for the study are as follows: burst is set to 0.1 sec and inter-burst period varied as shown in the graph. The two values of minrto chosen are 500 msec and 1 sec. We observe that the graphs are very similar. We expect to see that the throughput is higher when inter-burst time increases as shown in the figure. By reducing minrto we notice that we get higher throughput, for a given shrew attack configuration. Of course, this is not surprising as smaller minrto means that flow recovers from timeout sooner. We did not perform any more experiments by changing minrto since we would not gain any more insights Fair Queuing and shrew attacks Figure 6 shows a simple case of 1 tcp flow and 1 DoS flow with fair queueing implemented using Deficit Round Robin. It is observed that a very high normalised throughput of approximately.88 is reached. Intuitively, this happens because of the fact that fair queuing allocates the link 7

8 capacity equally among all the flows (two flows in this case). As a result of which, for the TCP flow the available bandwidth is close to 0.5 instead of 1 whenever a DoS attack takes place. Some packets of the TCP flow do get dropped, but not enough to cause a timeout and the TCP flow continues to get near full throughput when the DoS attack is idle. It is interesting to see if adding more DoS attack flows (with the same total rate as before) would reduce the throughput since fair queueing evenly distributes the capacity among the flows. If the DoS attack has 10 flows for 1 TCP flow, it was observed that the throughput did not change much. It was on the same scale as with the 1 TCP flow, 1 DoS flow. The intuition behind this is that it appears that in current ns implementation of DRR, the router considers all the flows from a particular node on a link to be one flow rather than multiple flows. So, essentially this boils down to the same case as before. 0 4Mbps Mbps 4Mbps 5 6 8

9 We ran DRR in the above topology, which consists of multiple source nodes executing the DoS attack. There is one TCP flow and 4 DoS flows. The source and destination for the TCP flow is 0 and 3. The sources for the DoS flows are 1, 4, 5 and 6 whose destinations are the same, namely 3 in this case. Each DoS flow had a rate of 1Mbps at burst time (with the same burst and interburst periods); thus, the total DoS rate at burst time was 4Mbps, which is exactly the same as with a single flow in the above experiment. In this case, the router did consider the four flows as distinct ones. Consequently, one would expect the DoS attack to be more successful here. And this is what we observed! The normalised throughput achieved was only approximately The instantaneous throughput graph is plotted below. We notice that the throughput reaches the value of 0.2 when the DoS attacks takes place as we expect since there are 5 flows in all (1 tcp + 4 dos). Sometimes, this reduced throughput triggers a timeout, other times it does not. The overall effect is an average througput of This means that the DoS attack was partially successful. In summary, fair queueing seems to be an effective mechanism to thwart the basic DoS attack. However, the DoS attacker can retaliate by choosing to have multiple DoS flows with the same total low rate and cause damage. While this damage was not as high as in the case with DropTail queues, it was still significant. One point to note in our above experiment is that the multiple DoS attacks originated from several different sources, thus constituting a distributed low rate DoS attack. DdoS attacks are harder to carry out because they require access to a large pool of resources. On the other hand, they may be harder to detect, especially if they are low rate as in the case of the above experiment. Our main reason to use multiple sources was that the DRR implementation in ns seemed to define flows according to the source ids. If there was a way to set up different flows starting from the same source, then multiple DoS attacks from the same source may have inflicted the same damage. However, we are not sure and this is an issue worth investigating further. 9

10 6.5. Randomizing the timeout at different TCP sources There are two ways of randomizing timeouts. One is to randomize the minrto. This has already been studied in the [KK03]. As noted in my first report the authors consider selecting minrto uniformly distributed in the range (a,b). They prove that the normalised throughput is atmost n/(n+1)* (b-a)/b. Thus, by increasing the range (a,b) one can potentially counter the shrew attack. However, the authors note that decreasing a could significantly degrade TCP throughput during periods of heavy congestion while increasing b could degrade the throughput of short lived flows. Another approach involving randomizing timeouts is to modify the TCP implementation as follows. Instead of setting RTO = max (minrto, SRTT + max (G, 4RTTVAR)), RTO could be chosen uniformly at random from a range that depends upon minrto and SRTT+ max (G, 4RTTVAR). For instance, we could choose RTO to be in the range between 80% and 120% of max (minrto, SRTT + max (G, 4RTTVAR)). Doing this would imply that the timeouts at different times of a TCP session would be different. This could prevent the DoS attacker from ever synchronizing with the TCP flow. Note that this is fundamentally different from the first approach, where the timeout once chosen randomly would remain the same for the entire duration of the connection. Nevertheless, we are still unsure whether this approach is an effective counter measure. To the best of our knowledge, we would need to modify the ns source files to test this approach and we leave this for future work Effect of distance between attacker and attacked router

11 In order to study the effect of distance between the attacker and the attacked router, we ran two simple experiments using the above topology. The one way latency on all the links are 10ms. The capacity of every link is 4Mbps. In the first experiment there were 3 TCP flows 1. From node 0 to node 3, 2. From node 6 to node 5, 3. From node 6 to node 7. There is one DoS flow from node 4 to node 3. As a result there is an attack on two routers, node 1 and node 2. The DoS attacker is at hop distance 2 from node 2. We study the impact of this attack on TCP flow 1 (node 0 to 3). Note that the traffic from 6 to 5 can be viewed as cross traffic. The TCP flows are associated with FTP applications and the DoS flow has a peak rate of 4Mbps, burst period of 100ms, inter-burst period ranging from 0.5 to 5 sec. In the second experiment there were 2 more TCP flows: one from node 9 to node 8 and another from node 9 to node 7. The DoS flow was from node 10 to node 3 with the same settings as before. Note that the DoS attacker is at hop distance 3 from node 2. Figure 8 compares the throughput of TCP flow 1 in these two experiments with that achieved when the attacker was within hop distance 1. It is clear from the figure that the DoS attack is equally potent when the attacker is farther from the attacked router. This experiment is too simplified to provide any conclusions. A much more thorough study with more complex topologies and different kinds of traffic flows is needed. 11

12 7. Conclusions and Future Work In this project, we studied the effect of various system and protocol settings on the impact of lowrate DoS attacks. Our experiments indicate that clock granularities, different variants of TCP such as TCP Vegas and modifying minrto values are unable to mitigate the effect of low rate DoS attack outlined in [KK03]. One promising counter measure appears to be the use of fair queueing in the routers. Our experiments suggest that the TCP flows can regain as much as 90% of the available bandwidth in the presence of a single low rate DoS attack. We also observed, however, that the attacker could counter this counter measure by having a set of very low rate attacks with the same total rate as before and cause substantial damage. This interaction between fair queueing and multiple DoS flows deserves further study. It is worth mentioning that [SLY04] has also experimentally verified that a fair resource allocation mechanism can be used to minimize the number of TCP flows that are affected. Another potential counter measure is to randomize the timeout as discussed in Section 6.5. A study of this approach seems to require modifying the ns source code. Finally, our study of impact of distance between attacker and attacked router indicates that the DoS attack may be equally effective when the attacker may be farther away from the router. 8. Bibliography [AP99] M. Allman and V.Paxson. On estimating end-to-end network path properties. In Proceedings of ACM SIGCOMM 99, Vancover, British Columbia, September [KK03] Aleksander Kuzmanovic and Edward W. Knightly. Low-Rate TCP-Targeted Denial of Service Attacks. In Proceedings of ACM SIGCOMM 03 [SLY04] Haibin Sun, John C.S. Lui and David K.Y. Yau. Defending Against Low-rate TCP Attacks: Dynamic Detection and Protection. In Proceeding of the 12 th IEEE International Conference on Network Protocols (ICNP 04). 12

Low-rate TCP-targeted Denial of Service Attack Defense

Low-rate TCP-targeted Denial of Service Attack Defense Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu

More information

Low-Rate TCP-Targeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants) Ý

Low-Rate TCP-Targeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants) Ý Low-Rate TCP-Targeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants) Ý Aleksandar Kuzmanovic and Edward W. Knightly ECE/CS Departments Rice University Houston, TX 775, USA akuzma,knightly@rice.edu

More information

Re- transmission Timer 2. TCP S TIMEOUT MECHANISM

Re- transmission Timer 2. TCP S TIMEOUT MECHANISM Low-Rate TCP-Targeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants) Aleksandar Kuzmanovic and Edward W. Knightly ECE/CS Departments Rice University Houston, TX 775, USA akuzma,knightly

More information

Defending Against Low-rate TCP Attacks: Dynamic Detection and Protection

Defending Against Low-rate TCP Attacks: Dynamic Detection and Protection Defending Against Low-rate TCP Attacks: Dynamic Detection and Protection Haibin Sun John C.S. Lui Department of Computer Science & Engineering The Chinese University of Hong Kong Email: hbsun,cslui @cse.cuhk.edu.hk

More information

TCP based Denial-of-Service Attacks to Edge Network: Analysis and Detection

TCP based Denial-of-Service Attacks to Edge Network: Analysis and Detection TCP based Denial-of-Service Attacks to Edge Network: Analysis and Detection V. Anil Kumar 1 and Dorgham Sisalem 2 1 CSIR Centre for Mathematical Modelling and Computer Simulation, Bangalore, India 2 Fraunhofer

More information

Denial of Service Attacks, What They are and How to Combat Them

Denial of Service Attacks, What They are and How to Combat Them Denial of Service Attacks, What They are and How to Combat Them John P. Pironti, CISSP Genuity, Inc. Principal Enterprise Solutions Architect Principal Security Consultant Version 1.0 November 12, 2001

More information

Project 4: (E)DoS Attacks

Project 4: (E)DoS Attacks Project4 EDoS Instructions 1 Project 4: (E)DoS Attacks Secure Systems and Applications 2009 Ben Smeets (C) Dept. of Electrical and Information Technology, Lund University, Sweden Introduction A particular

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

The Taming of The Shrew: Mitigating Low-Rate TCP-Targeted Attack

The Taming of The Shrew: Mitigating Low-Rate TCP-Targeted Attack IEEE TRANSACTIONS ON NETWORK SERVICE MANAGEMENT, VOL. 7, NO., MARCH The Taming of The Shrew: Mitigating Low-Rate TCP-Targeted Attack Chia-Wei Chang, Seungjoon Lee, Bill Lin, Jia Wang Abstract A Shrew attack,

More information

Improving Effective WAN Throughput for Large Data Flows By Peter Sevcik and Rebecca Wetzel November 2008

Improving Effective WAN Throughput for Large Data Flows By Peter Sevcik and Rebecca Wetzel November 2008 Improving Effective WAN Throughput for Large Data Flows By Peter Sevcik and Rebecca Wetzel November 2008 When you buy a broadband Wide Area Network (WAN) you want to put the entire bandwidth capacity to

More information

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

Queuing Algorithms Performance against Buffer Size and Attack Intensities

Queuing Algorithms Performance against Buffer Size and Attack Intensities Global Journal of Business Management and Information Technology. Volume 1, Number 2 (2011), pp. 141-157 Research India Publications http://www.ripublication.com Queuing Algorithms Performance against

More information

Robust Router Congestion Control Using Acceptance and Departure Rate Measures

Robust Router Congestion Control Using Acceptance and Departure Rate Measures Robust Router Congestion Control Using Acceptance and Departure Rate Measures Ganesh Gopalakrishnan a, Sneha Kasera b, Catherine Loader c, and Xin Wang b a {ganeshg@microsoft.com}, Microsoft Corporation,

More information

Data Networks Summer 2007 Homework #3

Data Networks Summer 2007 Homework #3 Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.

More information

Game-based Analysis of Denial-of- Service Prevention Protocols. Ajay Mahimkar Class Project: CS 395T

Game-based Analysis of Denial-of- Service Prevention Protocols. Ajay Mahimkar Class Project: CS 395T Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T Overview Introduction to DDoS Attacks Current DDoS Defense Strategies Client Puzzle Protocols for DoS

More information

Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing

Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing Ying Zhang University of Michigan wingying@umich.edu Z. Morley Mao University of Michigan zmao@umich.edu Jia Wang AT&T Labs Research jiawang@research.att.com

More information

Abstract. Introduction. Section I. What is Denial of Service Attack?

Abstract. Introduction. Section I. What is Denial of Service Attack? Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss

More information

An Efficient Detection Algorithm for TCP/IP DDoS Attacks

An Efficient Detection Algorithm for TCP/IP DDoS Attacks An Efficient Detection Algorithm for TCP/IP DDoS Attacks Heshem A. El Zouka Department of Computer Engineering, College of Engineering and Technology Arab Academy for Science & Technology and Maritime

More information

TCP in Wireless Mobile Networks

TCP in Wireless Mobile Networks TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer

More information

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1 Overview DDoS overview Types of attacks

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

15-441: Computer Networks Homework 2 Solution

15-441: Computer Networks Homework 2 Solution 5-44: omputer Networks Homework 2 Solution Assigned: September 25, 2002. Due: October 7, 2002 in class. In this homework you will test your understanding of the TP concepts taught in class including flow

More information

How To Block A Ddos Attack On A Network With A Firewall

How To Block A Ddos Attack On A Network With A Firewall A Prolexic White Paper Firewalls: Limitations When Applied to DDoS Protection Introduction Firewalls are often used to restrict certain protocols during normal network situations and when Distributed Denial

More information

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics Outline 15-441 Computer Networking Lecture 8 TCP & Congestion Control TCP connection setup/data transfer TCP Reliability Congestion sources and collapse Congestion control basics Lecture 8: 09-23-2002

More information

High-Speed TCP Performance Characterization under Various Operating Systems

High-Speed TCP Performance Characterization under Various Operating Systems High-Speed TCP Performance Characterization under Various Operating Systems Y. Iwanaga, K. Kumazoe, D. Cavendish, M.Tsuru and Y. Oie Kyushu Institute of Technology 68-4, Kawazu, Iizuka-shi, Fukuoka, 82-852,

More information

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,

More information

Performance Evaluation of DVMRP Multicasting Network over ICMP Ping Flood for DDoS

Performance Evaluation of DVMRP Multicasting Network over ICMP Ping Flood for DDoS Performance Evaluation of DVMRP Multicasting Network over ICMP Ping Flood for DDoS Ashish Kumar Dr. B R Ambedkar National Institute of Technology, Jalandhar Ajay K Sharma Dr. B R Ambedkar National Institute

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource

More information

First Midterm for ECE374 03/24/11 Solution!!

First Midterm for ECE374 03/24/11 Solution!! 1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your

More information

How To Protect A Dns Authority Server From A Flood Attack

How To Protect A Dns Authority Server From A Flood Attack the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point

More information

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India

More information

Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack

Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Jurand Nogiec University of Illinois Fausto Paredes University of Illinois Joana Trindade University of Illinois 1. Introduction BitTorrent

More information

Comparative Analysis of Congestion Control Algorithms Using ns-2

Comparative Analysis of Congestion Control Algorithms Using ns-2 www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,

More information

FEW would argue that one of TCP s strengths lies in its

FEW would argue that one of TCP s strengths lies in its IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 13, NO. 8, OCTOBER 1995 1465 TCP Vegas: End to End Congestion Avoidance on a Global Internet Lawrence S. Brakmo, Student Member, IEEE, and Larry L.

More information

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University

More information

Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project

Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used

More information

SECURING APACHE : DOS & DDOS ATTACKS - I

SECURING APACHE : DOS & DDOS ATTACKS - I SECURING APACHE : DOS & DDOS ATTACKS - I In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

AKAMAI WHITE PAPER. Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling

AKAMAI WHITE PAPER. Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling AKAMAI WHITE PAPER Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling Delivering Dynamic Web Content in Cloud Computing Applications 1 Overview

More information

Multipath TCP in Practice (Work in Progress) Mark Handley Damon Wischik Costin Raiciu Alan Ford

Multipath TCP in Practice (Work in Progress) Mark Handley Damon Wischik Costin Raiciu Alan Ford Multipath TCP in Practice (Work in Progress) Mark Handley Damon Wischik Costin Raiciu Alan Ford The difference between theory and practice is in theory somewhat smaller than in practice. In theory, this

More information

Analysis and Detection of a Denial-of-Service Attack Scenario generated by TCP Receivers to Edge Network

Analysis and Detection of a Denial-of-Service Attack Scenario generated by TCP Receivers to Edge Network Analysis and Detection of a Denial-of-Service Attack Scenario generated by TCP Receivers to Edge Network V. Anil Kumar 1 and Dorgham Sisalem 2 (anil@cmmacs.ernet.in, sisalem@fokus.fhg.de) 1 CSIR Centre

More information

2.2 Methods of Distributed Denial of Service Attacks. 2.1 Methods of Denial of Service Attacks

2.2 Methods of Distributed Denial of Service Attacks. 2.1 Methods of Denial of Service Attacks Distributed Denial of Service Attacks Felix Lau Simon Fraser University Burnaby, BC, Canada V5A 1S6 fwlau@cs.sfu.ca Stuart H. Rubin SPAWAR Systems Center San Diego, CA, USA 92152-5001 srubin@spawar.navy.mil

More information

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013 CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60

More information

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Ho-Seok Kang and Sung-Ryul Kim Konkuk University Seoul, Republic of Korea hsriver@gmail.com and kimsr@konkuk.ac.kr

More information

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.

More information

Acquia Cloud Edge Protect Powered by CloudFlare

Acquia Cloud Edge Protect Powered by CloudFlare Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....

More information

Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks

Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks Vikram Gupta +, Srikanth Krishnamurthy, and Michalis Faloutsos Abstract Department of Computer Science and Engineering, UC Riverside,

More information

Denial Of Service. Types of attacks

Denial Of Service. Types of attacks Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident is considered an attack if a malicious user intentionally disrupts service

More information

CloudFlare advanced DDoS protection

CloudFlare advanced DDoS protection CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com

More information

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...

More information

Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network

Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network 作 者 :Daiqin Yang, Ka-Cheong Leung, and Victor O. K. Li 出 處 :Wireless Communications and Networking Conference, 2007.WCNC

More information

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and

More information

ENSC 427 Communications Network Spring 2015 Group 8 http://www.sfu.ca/~spc12/ Samuel Chow <spc12 at sfu.ca> Tenzin Sherpa <tserpa at sfu.

ENSC 427 Communications Network Spring 2015 Group 8 http://www.sfu.ca/~spc12/ Samuel Chow <spc12 at sfu.ca> Tenzin Sherpa <tserpa at sfu. Performance analysis of a system during a DDoS attack ENSC 427 Communications Network Spring 2015 Group 8 http://www.sfu.ca/~spc12/ Samuel Chow Tenzin Sherpa Sam Hoque

More information

Survey on DDoS Attack Detection and Prevention in Cloud

Survey on DDoS Attack Detection and Prevention in Cloud Survey on DDoS Detection and Prevention in Cloud Patel Ankita Fenil Khatiwala Computer Department, Uka Tarsadia University, Bardoli, Surat, Gujrat Abstract: Cloud is becoming a dominant computing platform

More information

DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack

DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack Sugih Jamin EECS Department University of Michigan jamin@eecs.umich.edu Internet Design Goals Key design goals of Internet protocols:

More information

Computer Networks Homework 1

Computer Networks Homework 1 Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.

More information

Analyzing Marking Mod RED Active Queue Management Scheme on TCP Applications

Analyzing Marking Mod RED Active Queue Management Scheme on TCP Applications 212 International Conference on Information and Network Technology (ICINT 212) IPCSIT vol. 7 (212) (212) IACSIT Press, Singapore Analyzing Marking Active Queue Management Scheme on TCP Applications G.A.

More information

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security

More information

Comparative Analysis of various Active Queue Management Algorithms under Flooding based LDDoS Attack

Comparative Analysis of various Active Queue Management Algorithms under Flooding based LDDoS Attack Comparative Analysis of various Active Queue Management Algorithms under Flooding based LDDoS Attack Bhavya Jain Department of Computer Science Punjab Technical University, Punjab, India Sanjay Madan Cyber

More information

Survey on DDoS Attack in Cloud Environment

Survey on DDoS Attack in Cloud Environment Available online at www.ijiere.com International Journal of Innovative and Emerging Research in Engineering e-issn: 2394-3343 p-issn: 2394-5494 Survey on DDoS in Cloud Environment Kirtesh Agrawal and Nikita

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

SJBIT, Bangalore, KARNATAKA

SJBIT, Bangalore, KARNATAKA A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,

More information

Safeguards Against Denial of Service Attacks for IP Phones

Safeguards Against Denial of Service Attacks for IP Phones W H I T E P A P E R Denial of Service (DoS) attacks on computers and infrastructure communications systems have been reported for a number of years, but the accelerated deployment of Voice over IP (VoIP)

More information

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)

More information

First Midterm for ECE374 03/09/12 Solution!!

First Midterm for ECE374 03/09/12 Solution!! 1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Chapter 6 Congestion Control and Resource Allocation

Chapter 6 Congestion Control and Resource Allocation Chapter 6 Congestion Control and Resource Allocation 6.3 TCP Congestion Control Additive Increase/Multiplicative Decrease (AIMD) o Basic idea: repeatedly increase transmission rate until congestion occurs;

More information

Upgrading Mice to Elephants: Effects and End-Point Solutions

Upgrading Mice to Elephants: Effects and End-Point Solutions Upgrading Mice to Elephants: Effects and End-Point Solutions Amit Mondal and Aleksandar Kuzmanovic Department of Electrical Engineering and Computer Science Northwestern University Evanston, IL, 628, USA

More information

Denial of Service (DoS)

Denial of Service (DoS) Intrusion Detection, Denial of Service (DoS) Prepared By:Murad M. Ali Supervised By: Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT), Amman s campus-2006 Denial of Service (DoS) What is DoS

More information

Secure SCTP against DoS Attacks in Wireless Internet

Secure SCTP against DoS Attacks in Wireless Internet Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. The Stream Control Transport Protocol

More information

Security vulnerabilities in the Internet and possible solutions

Security vulnerabilities in the Internet and possible solutions Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in

More information

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1) Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including

More information

Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment

Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment TrueSpeed VNF provides network operators and enterprise users with repeatable, standards-based testing to resolve complaints about

More information

First Midterm for ECE374 02/25/15 Solution!!

First Midterm for ECE374 02/25/15 Solution!! 1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas

More information

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------ Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------

More information

Comparing Two Models of Distributed Denial of Service (DDoS) Defences

Comparing Two Models of Distributed Denial of Service (DDoS) Defences Comparing Two Models of Distributed Denial of Service (DDoS) Defences Siriwat Karndacharuk Computer Science Department The University of Auckland Email: skar018@ec.auckland.ac.nz Abstract A Controller-Agent

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

Sample Network Analysis Report

Sample Network Analysis Report Sample Network Analysis Report Report Information Report created on 1/9/2014 9:35:19 PM. Analyst Information Name Sample Analysis Report E-mail Address info@chappellu.com Phone Number 408-378-7841 Client

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 Comparison of TCP I-Vegas with TCP Vegas in Wired-cum-Wireless Network Nitin Jain & Dr. Neelam Srivastava Abstract

More information

Mitigating Denial-of-Service and Distributed Denial-of-Service Attacks Using Server Hopping Model Using Distributed Firewall

Mitigating Denial-of-Service and Distributed Denial-of-Service Attacks Using Server Hopping Model Using Distributed Firewall Mitigating Denial-of-Service and Distributed Denial-of-Service Attacks Using Server Hopping Model Using Distributed Firewall Prajyoti P.Sabale 1, Anjali B.Raut 2 1 Department of Computer Science &Information

More information

An Efficient Distributed Algorithm to Identify and Traceback DDoS Traffic

An Efficient Distributed Algorithm to Identify and Traceback DDoS Traffic Ó The Author 26. Published by Oxford University Press on behalf of The British Computer Society. All rights reserved. For Permissions, please email: journals.permissions@oxfordjournals.org doi:1.193/comjnl/bxl26

More information

La couche transport dans l'internet (la suite TCP/IP)

La couche transport dans l'internet (la suite TCP/IP) La couche transport dans l'internet (la suite TCP/IP) C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham Congduc.Pham@univ-pau.fr Cours de C. Pham,

More information

CS 356 Lecture 16 Denial of Service. Spring 2013

CS 356 Lecture 16 Denial of Service. Spring 2013 CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter

More information

TCP/IP Over Lossy Links - TCP SACK without Congestion Control

TCP/IP Over Lossy Links - TCP SACK without Congestion Control Wireless Random Packet Networking, Part II: TCP/IP Over Lossy Links - TCP SACK without Congestion Control Roland Kempter The University of Alberta, June 17 th, 2004 Department of Electrical And Computer

More information

Seminar Computer Security

Seminar Computer Security Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example

More information

DoS/DDoS Attacks and Protection on VoIP/UC

DoS/DDoS Attacks and Protection on VoIP/UC DoS/DDoS Attacks and Protection on VoIP/UC Presented by: Sipera Systems Agenda What are DoS and DDoS Attacks? VoIP/UC is different Impact of DoS attacks on VoIP Protection techniques 2 UC Security Requirements

More information

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of

More information

Effect of Packet-Size over Network Performance

Effect of Packet-Size over Network Performance International Journal of Electronics and Computer Science Engineering 762 Available Online at www.ijecse.org ISSN: 2277-1956 Effect of Packet-Size over Network Performance Abhi U. Shah 1, Daivik H. Bhatt

More information

Firewalls and Intrusion Detection

Firewalls and Intrusion Detection Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall

More information

Chapter 8 Security Pt 2

Chapter 8 Security Pt 2 Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,

More information

Delay-Based Early Congestion Detection and Adaptation in TCP: Impact on web performance

Delay-Based Early Congestion Detection and Adaptation in TCP: Impact on web performance 1 Delay-Based Early Congestion Detection and Adaptation in TCP: Impact on web performance Michele C. Weigle Clemson University Clemson, SC 29634-196 Email: mweigle@cs.clemson.edu Kevin Jeffay and F. Donelson

More information

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Michael Bauer, Srinivasan Ravichandran University of Wisconsin-Madison Department of Computer Sciences {bauer, srini}@cs.wisc.edu

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742 Vol 2 No 3 (May-2015) Active Queue Management For Transmission Congestion control Manu Yadav M.Tech Student

More information

Configuring TCP Intercept (Preventing Denial-of-Service Attacks)

Configuring TCP Intercept (Preventing Denial-of-Service Attacks) Configuring TCP Intercept (Preventing Denial-of-Service Attacks) This chapter describes how to configure your router to protect TCP servers from TCP SYN-flooding attacks, a type of denial-of-service attack.

More information

17: Queue Management. Queuing. Mark Handley

17: Queue Management. Queuing. Mark Handley 17: Queue Management Mark Handley Queuing The primary purpose of a queue in an IP router is to smooth out bursty arrivals, so that the network utilization can be high. But queues add delay and cause jitter.

More information

TLP WHITE. Denial of service attacks: what you need to know

TLP WHITE. Denial of service attacks: what you need to know Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...

More information