Exploiting P2P Systems for DDoS Attacks
|
|
|
- Stella Wells
- 10 years ago
- Views:
Transcription
1 Exploiting P2P Systems for DDoS Attacks Naoum Naoumov and Keith Ross Department of Computer and Information Science Polytechnic University, Brooklyn, NY 1121 Abstract When a P2P system has millions of concurrently active peers, there is the risk that it could serve as a DDoS engine for attacks against a targeted host. In this paper we describe two approaches to creating a DDoS engine out of a P2P system: the first involves poisoning the distributed index in the peers; the second involves poisoning the routing tables in the peers. For both approaches, the targeted host does not have to be a participant in the P2P system, and could be a web server, a mail server, or a user s desktop. We then examine these two poisoning attacks in Overnet, a popular DHT-based P2P file-sharing system. By using limited poisoning attacks of short duration on Overnet s indexing and routing tables, we create DDoS attacks against a targeted host. We find that with modest effort, both DDoS attacks can direct significant traffic from diverse peers to the target. I. INTRODUCTION In a flooding Distributed Denial of Service (DDoS) attack, the attacker exploits a large number of hosts, often referred to as zombies, to concurrently send seemingly legitimate packets to an intended victim host. The goal of such an attack is to exhaust key resources at the target, diminishing the target s capacity to either provide or receive service. Resources that can be exhausted include the target s downstream bandwidth, upstream bandwidth, CPU processing, or TCP connection resources. From the attacker s perspective, a successful DDoS attack will not only exhaust key resources at the target host but will also involve a large number of zombies from different ISPs. This last characteristic makes it difficult for upstream devices to detect and filter the attack packets based on their source IP addresses. We are concerned with two major classes of flooding DDoS attacks in this paper. The first type, which we call TCPconnection DDoS attack, is to overwhelm the victim s connection resources with fully-open TCP connections, thereby hampering legitimate users from making connections to the victim host. The second type, which we call the bandwidth DDoS attack is to generate enough traffic to tie up the bandwidth of the victim s access link (either downstream or upstream). UDP, TCP SYN or ICMP packets can be used as the raw material in a bandwidth DDoS attack. In this paper, we explore how the indexing and routing substrates in P2P systems can potentially be manipulated to create bandwidth and TCP-connection DDoS attacks. More specifically, in this paper we explore two types of poisoning, which we call index poisoning and the routing table poisoning. With index poisoning, the attacker inserts bogus records into the P2P index system. These bogus records indicate that one or more popular files are located at the targeted IP address and port number. Importantly, the target host does not have to be a participant in the P2P system, and could be a mail server, a web server, or a user s desktop. When peers later search for the popular files, the index will inform them that the popular files are available at the targeted port of the targeted host. The peers then connect with the target and attempt to download the files, potentially overwhelming it with fully-open TCP connections or filling up the number of allowed connections and preventing legit users from obtaining services. With routing poisoning, the attacker attempts to poison the routing tables in the P2P nodes. Specifically, the attacker attempts to make the targeted host an overlay neighbor of many of the peers in the P2P system. When a poisoned peer forwards a query, publish or overlay maintenance message, it may select the targeted host from its neighbor set, and send the message directly to the target. Given that there are millions of concurrently active peers in many P2P systems, if a significant fraction of the peers have their routing tables poisoned, the target host can potentially receive a flood of query, publish and maintenance traffic, and hence be the victim of a bandwidth DDoS attack. The position of this paper is that, unless carefully designed, a P2P system may be vulnerable to index poisoning or to routing poisoning, and can thus be exploited as a massive DDoS flooding engine. Our principle vehicle for arguing this position is a protocol analysis and measurement study of Overnet, a DHT-based file-sharing system. With more than one million concurrently active peers, Overnet is probably the largest DHT deployed to date. It is also a core component of edonkey, which generates today more traffic than any other content-distribution system, including BitTorrent [17]. Our experiments show that Overnet is indeed vulnerable to both index poisoning and routing poisoning. Using software developed in house, we carry out (limited and short-lived) attacks on Overnet, and measure the amount of traffic and TCP connections that are directed to our victim host (running on the Polytechnic University campus). Our measurements show that Overnet can indeed be exploited as a DDoS engine with a massive number of zombies. We conjecture that other P2P systems, besides Overnet, can also be leveraged as DDoS engines against arbitrary targets. This paper is organized as follows. In Section II we describe in more detail index and routing table poisoning. In Section III we describe the Overnet file-sharing system.in Section IV we describe our experiment for creating a DDoS attack against a target host and present measurement results. In Section V we discuss how the index and routing substrates can be designed to make P2P systems less vulnerable. A. Related Work There have been numerous books and papers written on DoS and DDoS attacks; for some recent research see [1], [2],
2 [1], [11], [12], [13]. None of this research has addressed how P2P systems can be exploited for DDoS attacks. Daswani and Garcia-Molina study the query-flood DDoS attack in Gnutella, and different policies that nodes might take to mitigate the attack [7]. However, it only examines the case when the target of the attack is itself a Gnutella peer. In this paper our focus is using to P2P systems for DDoS attacks against arbitrary hosts. We use Overnet as a vehicle in exploring P2P-driven DDoS attacks. In doing so, we develop a crawler and measurement apparatus for Overnet. Bhagwan [3] et al and Kutzner and Fuhrmann [4] have also developed Overnet crawlers for measuring Overnet characteristics, such as peer availability. Overnet is a proprietary protocol. However, the creation of Overnet crawlers is facilitated by the open-source project kadc [16], which implements the majority of the Overnet messages. Gosling describes a buffer overflow attack on the edonkey client [5]. A. Index Poisoning II. INDEX AND ROUTING POISONING Many P2P systems include an index. The index contains records which map keys to values. For example, for P2P file sharing systems, the index maps file identifiers (e.g., hashes of files) to locations (that is, IP address and port number). An index may also provide other types of mappings; for example, in Skype, the index maps user names to locations. An index may be centralized (as it was in Napster) or distributed over a large subset of peers (as it is in FastTrack, Overnet, Skype and many other commercial P2P systems). We refer to the peers that participate in the distributed index as the indexing peers. Each indexing peer includes a portion of the index, and these portions may overlap across the indexing peers. With index poisoning, the attacker s goal is to trick indexing peers into adding bogus records into their local indexes, where the location in the bogus records is the IP address and port number of victim host and service. For example, if the attacker wants to DDoS attack the mail service at host , the bogus record would contain for IP address and 25 for port number. Depending on the P2P system and its implementation, it may be possible to trick an indexing peer by simply sending it a message which includes a bogus record; upon receiving the bogus record, the indexing peer may include it in its local index. After an indexing peer has been poisoned, when another peer searches for the location of a particular file, it may receive a bogus record from the poisoned peer, and then attempt to download the file from the victim host. During this download attempt, it will first establish a TCP connection with the victim host at the port number specified in the bogus record. After establishing the connection, the downloading peer will send an application protocol-specific message, indicating the file it wishes to download. Not understanding this message, the victim host may ignore the message and let the TCP connection hang, may close the TCP connection, or may even crash. If many peers attempt to download from the victim host, the victim host becomes subject to TCP-connection DDoS attack. The implications may even be worse if the client automatically retries every few minutes. In the classic TCP SYN flood DDoS attack, zombies flood the intended victim with TCP SYN packets but do not complete the TCP handshake with TCP ACK packets (typically because the zombies are using spoofed source IP addresses). This creates a multitude of half-open connections and can exhaust the victim s connection resources. However, operating systems can (and often do) eliminate this vulnerability by using TCP SYN cookies [18], [1]. The TCP-connection DDoS attack described here is nastier than the TCP SYN flood attack. It creates multitudes of fully-open TCP connections, which cannot be countered with TCP SYN cookies. B. Routing Table Poisoning Recall that in a DHT-based P2P system, the peers have IDs in some ID space. These IDs are used to organize the peers into an overlay, with each peer having a set of neighbors. In many DHT systems, peers have a relatively small number of neighbors, typically, O(log N), where N is the total number of peers. A peer s list of neighbors constitutes its routing table. Each entry in the list contains the neighbor s ID, IP address, and port number. Recall that a query message in a DHT contains a key. When a peer receives (or generates) a message, it uses to the key to select a neighbor from the routing table to forward the message to. (The forwarding can be iterative with the node originating the query being the root, as is the case in Overnet.) The neighbor selection process is DHT-dependent. For example, in the Kademlia DHT, the peer uses the XOR metric to select the closest neighbor to the key [6]. When a peer joins the system, it builds its routing table, and this table is continuously updated as other peers join and leave the system. When a peer detects that a neighbor has left the system, it removes that neighbor from the routing table. When a peer discovers a new peer in the system (for example, upon receiving a query message), it may add that peer to its routing table. The details of how a routing table is updated is highly DHT and protocol implementation specific. With routing table poisoning, the attacker s goal is to trick peers into adding bogus neighbors into their routing tables, where the IP address of these bogus neighbors is the IP address of the victim. Depending on the DHT and its implementation, it may be possible to poison a peer by simply sending it a message which announces the existence of a bogus peer. Upon receiving the announcement, the peer may choose to include the bogus peer in its routing table. Later, when the poisoned peer needs to forward one or messages through the DHT, it may select the bogus neighbor in its routing table and forward the messages to that neighbor. If many peers are poisoned, so that they add one or more bogus entries to their routing table, with each bogus entry having the IP address of the victim host, then the victim host could receive a flood of messages from the DHT, with the messages coming from millions of different sources. Furthermore, because the victim node is not a participant in the P2P system, it will typically
3 reply with an error message for each message received, additionally clogging up the victim s upstream pipe. Many P2P systems are designed so that when a peer learns that one of its neighbors has left the system (because the neighbor didn t respond with a valid message), the peer removes the neighbor from its routing table. In this case, each successful poisoning announcement generates a burst of messages directed at the target, after which the bogus neighbor is removed from the peer s routing table. Thus, routing table poisoning is similar to reflection attacks [2], with a poisoned peer serving as a reflector. Each successful announcement causes the poisoned peer to generate a single burst of one or more packets directed at the victim. A measure of efficiency of a reflector attack is its amplification, which can be defined as the average number of packets in a burst. We shall see in Section IV that the amplification can potentially be huge with routing table poisoning. We remark in passing that reflector attacks that send DNS requests with spoofed IP addresses to DNS servers have successfully crippled targets [1]. III. OVERNET AND DDOS To gain greater insight into the index and routing table attacks, we examine in detail Overnet, which is a part of the edonkey client. Kad, deployed in emule, is an open-source cousin of Overnet. Both Overnet and Kad are based on the Kademlia DHT [6]. Kademlia is similar in many respects to Pastry [19] and Tapestry [2]. To understand how Overnet can be exploited as a DDoS engine, we review some of its relevant features. When a client joins Overnet, it joins with a 128-bit ID. Presented with any 128-bit key, the Kademlia DHT finds the peers that have the closest IDs, where closeness is defined in terms of the XOR metric. To locate the closest peers, Overnet uses UDP messages and iterative searches. In particular, the querying client sends a series of UDP messages to a sequence of peers, with each peer in the sequence having an ID that is closer to the key. A. Constructing and Maintaining the Routing Table When a peer joins Overnet, it attempts to make contact with at least one peer from a locally cached list of peers (created during previous sessions). After finding a peer that is alive, the joining peer finds overlay neighbors by sending search messages for its own ID. The joining peer receives routing table entries from the peers in the path between itself and the closest peer to the ID. It constructs its own routing table by aggregating the received entries [6]. Once the joining peer has constructed a local routing table, it announces its presence to all the nodes in its routing table. When a peer receives such an announcement, it can update its own routing table by including the joining peer in the table. B. Advertising Files After a peer constructs its routing table and announces its presence, it starts publishing information about the files it is sharing. The publishing process consists of two phases: During the first phase, after hashing the file to obtain the file identifier, the peer sends into the DHT a location publish message which contains the file identifier and the file location (IP and port). This message is iteratively routed through the DHT to peers that are close to the identifier in the ID space. When these peers receive the message, they update their local indexes. During the second phase, the joining peer extracts keywords from the file s name and hashes each keyword into a 128-bit key. For each such keyword, the peer sends into the DHT a metadata publish message which contains the hash of the keyword, the hash of the shared file, and metadata information for the file, such as artist, title, album, file size, file type, etc. This message is also iteratively routed through the overlay to peers that are close to the hash of the keyword in the node ID space. When these peers receive the message, they update their local indexes. C. Searching for Files Searching works similarly to advertising, but the steps followed are in reverse order. The user first enters, say, n keywords into the client GUI. The client hashes each keyword and obtains hash(keyword 1 ), hash(keyword 2 ),..., hash(keyword n ). The client then iteratively searches the DHT for each of the hashes. When a query reaches a peer that has records for the keyword, this peer returns the matching records to the querying peer. Each matching record consists of the file identifier (hash of file) and all the metadata available, such as file name, artist, file type and size. The requesting peer thus receives several sets of identifiers, one set for each keyword. The client filters the responses, keeping only those title names that match all the keywords. The GUI displays all of the filtered responses. The user then selects an entry for downloading, say, a file with identifier H. The client then performs a location search, iteratively querying the DHT for H. When a query reaches a peer that has records for the identifier H, the peer sends to the client a list of locations (IP address and port number pairs) for copies of that file. The client then tries to download the file from some of the locations with TCP connections. D. Overnet as a DDoS Engine We now describe how an attacker can exploit Overnet for launching DDoS attacks 1. Let Z denote the victim host, which is not necessarily in Overnet. The attacker crawls Overnet, learning about new locations (IP address and port number) from the currently visited locations. During the crawling, the attacker either poisons the distributed index (for the index attack) or poisons the routing table (for the routing table attack). We first describe how index poisoning can be done in Overnet. The attacker, say at Overnet node X, sends an Overnet location publish message to each of the crawled nodes while crawling. Figure 1 shows the location publish message, which gets encapsulated in a UDP packet. In these publish messages, the attacker includes the victim s IP address and 1 We have informed the Overnet team about the vulnerabilities; however, at the time of this writing, the problems still exist.
4 port number. The attacker also puts any file hash it wants into the message. When node Y receives the publish message, Y adds the file hash to its index along with the location of the victim Z. Importantly, before adding this record, in Overnet, Y does not verify that Z has the file or even that Z is an Overnet peer. Later, when some node W wants the file corresponding to the file hash, W may be told by one of the poisoned indexes that victim Z has the file. Node W then establishes a fullyopen TCP connection to the target service running on Z. As we shall see, this TCP connection may hang for a minute or more location_size tag[] Fig. 1. Location publish message: 1 byte edonkey, 1 byte message type, 16 bytes file hash, 16 bytes publisher s peer ID, 4 bytes number of tags, loc= bcp://ip:port We now describe routing table poisoning. The attacker, say at Overnet node X, sends an Overnet announcement message to each visited node during the crawling. Figure 2 shows the announcement message, which gets encapsulated in a UDP packet. In these announcement messages, the attacker inserts the victim s IP address in the peer IP field. The attacker also inserts a peer ID into the message (more about this choice later). Let Y denote the peer currently visited by the crawler. When Y receives the announcement, Y may add the victim Z to its routing table. Importantly, in Overnet, before adding Z, Y does not verify that Z actually belongs to Overnet. If many of the crawled nodes enter the victim Z into its routing table, and if the associated peer ID is such that Z is often selected as a neighbor from the routing table, then these tricked nodes will direct Overnet messages to the victim Z. We have described how routing table poisoning can be done with announcement messages. In principle, it can be done with other message types as well, including publish and query messages Fig. 2. Announcement message: 1 byte edonkey, 1 byte message type, 16 bytes peer ID, 4 bytes peer IP, 2 bytes peer port, 1 byte peer type IV. OVERNET MEASUREMENT STUDY In this section we show that it is indeed possible to exploit Overnet to launch a DDoS attack against an arbitrary victim host. In our experiments, the victim host resides at Polytechnic University. We show that by poisoning peers indexes, we can create a TCP-connection DDoS attack; and by poisoning peers routing tables, we can create a bandwidth DDoS attack. The attacks are not only DDoS attacks against our victim; they are also attacks against the users of Overnet, who are often directed to incorrect hosts during searching and downloading. For this reason, we keep the attacks brief and do not attempt to maximize the amount of traffic directed to the victim host. Instead, our goal is to merely show that with relatively little effort, Overnet can be exploited for DDoS attacks. Our crawler works by sending connect messages to all peers that it learns about and search messages to peers that it already knows are alive. Considering the vast number of peers in Overnet, we ran our crawler from 16 machines. For simplicity, the crawlers running on the different machines do not communicate with each other and simply begin with different seed peers. The combined work of the crawlers covered the vast majority of the participating Overnet nodes. At the victim host, we ran a measurement program to record statistics about incoming data. The victim host did not run an Overnet client. As a preparation for the attacks, we selected several popular titles from the music charts. We then searched for versions of those songs, obtaining a list of hashes of existing versions that the DHT already knows about. From the popular songs, we also selected 1 popular keywords and obtained the hash of each keyword. A. Experimental Results For index poisoning, we sent location publish messages to the crawled peers, with the file hash in the publish messages being the file hash of a popular version, as described above. In this manner, when a users wanted to download one of the popular files, with high probability the user attempted to download it from the victim host (as well as from other nodes, as Overnet employs parallel downloading). To keep the impact on Overnet low, we limited our advertisements for a 45 minute period. We continued recording the incoming traffic after the advertising processes stopped. We used a list of 7,564 file hashes, but we didn t send a publish messages for each file hash to each Overnet peer. Instead, for a particular file hash, we sent a publish message to a peer if the first 6 bytes of the peer ID and the file hash were the same. This allowed us to cover the majority of the Overnet nodes in less than an hour. We ran an Apache web server at the target host and measured the number of connections present every second. Figure 3 shows the total number of connections and the number of ESTABLISHED connections as produced by netstat every second. It is important to note that for index poisoning, the poisoning persisted for hours after the publishing stopped, which occurred at 45 minutes. This is because the bogus records persisted in the indexes for hours, even after peers failed to download from the target host. The TCP connections originated from thousands of different peers (see discussion below on routing table attack). Figure 4 shows that not only does the attack generate TCP connections at the target node, but that the connections also have significant durations. For our 9-hour trace, the average connection duration was about one minute. For routing table poisoning, we sent announcement messages to crawled peers, with the peer IDs in the announcement messages being the hashes of the popular keywords. In this manner, a fraction of the search and publish messages for each of the popular keywords are directed to the victim host. Figure 5 shows the amount of UDP traffic received at the target node. The traffic starts at kbps and rapidly increases to 1 Mbps in less than a minute once the attack is launched. The traffic then remains in the 1.2 to 1.6 Mbps range until
5 Fig. 3. Number of TCP Connections Total ESTABLISHED Time [h] Number of TCP connections present in one-second intervals 1 from about 1,6 Overnet peers. For the entire duration of the attack, the target host received traffic from 34,274 peers from 22,484 Autonomous Systems (ASes). This illustrates that the attack is highly distributed, making ingress filtering by source IP addresses difficult if not impossible [1]. Number of IPs Number of connections Fig Duration [s] Histogram of TCP connection durations the crawler is stopped; the traffic then quickly tails off. On average, there is about 1.3 Mbps of downstream traffic (not including Ethernet headers) at the victim node during the attack period, not counting any traffic blocked by our university firewall. There is also, on average, about 1.5 Mbps upstream traffic out of the victim node, consisting of ICMP error messages generating by the victim s operating system. The reason for the rapid decrease of traffic at the victim after the attack is terminated is that in Overnet nodes frequently reannounce themselves, whereas we didn t frequently reannounce the victim. The victim host also doesn t properly reply to any of the UDP messages that it receives; so that after sending traffic to the victim, the peer removes the victim from its routing table Time [h] Fig. 6. Number of distinct Overnet hosts sending traffic to target in onesecond intervals. In addition to source peer diversity, amplification is an important measure (see Section II-B). Figure 7 shows the CDF of packet bursts sent per announcement message. We see that 44% of the bursts contained only 1 packet. Typically, one-packet bursts are queries and multiple-packet bursts are bursts of publish messages. Remarkably, many bursts contain hundreds or even thousands of bursts. This indicates that it may be possible to optimize the announcements and the peers to which they are sent, generating significant amplification in the DDoS attack. We note in passing that the bursts with thousands of messages most likely emanate from attackers which have been hired by music and film companies [9] Percent of traffic Bandwidth [Mbps] Fig Time [h] Routing Table Attack: UDP Traffic at Victim Host Figure 6 shows the number of unique IP addresses that send traffic to the target host in each one-second interval. We see that in each one-second interval the target host receives packets Number of messages in sequence Fig. 7. CDF of Bursts We can conclude from these experiments that with little effort in optimizing the attack, a significant amount of traffic and connections can be directed at an arbitrary victim host. For example, our routing table poisoning generated on average about 1.5 Mbps of upstream traffic at the victim, which is enough to exhaust the bandwidth of most victims with broadband residential access or institutions with T1 access; moreover, the traffic emanated from hundreds of thousands of different Overnet nodes. Our index poisoning caused over 3 TCP connections to hang at the victim, which persisted for hours after the attack. By increasing the number of attacked titles, and optimizing the attack procedure, more traffic and
6 connections can be generated, perhaps by a factor of 1 or more. V. ISSUES WITH COUNTER MEASURES In this section we briefly discuss issues surrounding counter measures to the attacks. Recall that in routing poisoning, a peer Y receives a message which announces the existence of a node Z, where Z is the victim and not a participant in the P2P system. A counter measure is to have peer Y check to see if Z is a peer in the P2P system. There are a few ways to do this: Y can send Z a message, eliciting a valid response. Traffic would still be reflected to Z, but now only with an amplification factor of 1. Encryption and closed-source software, so that nodes can only be announced by themselves. But those techniques can often be reverse engineered and circumvented [9] Recall that in the index attack, an indexing peer Y receives a publish message which advertises the existence of a file at a location Z. One way to a counter a DDoS attack (on a non-participating host) is to have peer Y verify that Z is a participant in the P2P network. This can again be done by having Y handshake with Z. However, handshaking with each peer Z that advertises content to Y may introduce significant additional overhead traffic, both for Y and Z. A. NATs Complicating counter measures further is the need to accommodate NATed hosts that share content. In order to understand why it is not applicable we need to look at how Overnet handles NATed hosts. Measurement studies have shown that 3%-4% of the peers in a P2P system may be behind NATs [8]. Many NATs do not allow external hosts to establish connections to hosts behind the NAT. In file sharing systems, this might prevent users from downloading files from a NATed host, and in VoIP applications the NATed host may not be able to accept incoming calls. Many P2P applications have implemented workarounds for the NAT problem. For example, in FastTrack, in order to request a file from a NATed peer, the user contacts that peer s supernode and that node tells the NATed peer about the request. Subsequently, the NATed peer will initiate the TCP connection, thus creating a reverse TCP connection. In Overnet the NATed peer sends location and metadata publish messages itself, but instead of providing its own IP address as the source for the shared file, it uses a delegate peer s IP. Later, if a peer wants to download the file shared by the NATed host, it will contact the provided delegate peer and have the delegate peer tell the NATed host to establish a reverse connection. This is possible due to the two different formats of location entries in the DHT. Typically, file locations are published with the following format: version hash peer id ip:port where the version hash is a hash over the content of the file, peer id is the ID of the peer that has the content, ip:port is the actual location of an Overnet client that has the file. If, however, a NATed peer is sharing files and sending publish messages, the file locations have the following format: version hash peer id peer id:delegate ip:delegate port the difference here is that the location tag includes the ID of the NATed peer, and the IP and port of a delegate peer. Because of this protocol specific NAT-accommodation technique, in Overnet the IP header source is not necessarily the same as the published source. This complicates anti-ddos measures. A way to solve that problem would be to have the delegate nodes send the publish messages instead of the NATed host, and then verify with a 3-way handshake. Since a delegate node may be a delegate for many NATed hosts, this could substantially increase the traffic at the delegate nodes. VI. CONCLUSION We have argued that P2P index and routing substrates can potentially be exploited for DDoS attacks. As a case study, we showed how Overnet can be exploited. This issue needs to be brought to the forefront, as future P2P systems need to be designed without this DDoS vulnerability. ACKNOWLEDGMENT We would like to thank Jian Liang for his comments and help. This work was partially supported by NSF grant CNS REFERENCES [1] J. Mirkovic, S. Dietrich, D. Dittrich, and P. Reiher. Internet Denial of Service: Attack and Defense Mechanisms. Prentice Hall 24. [2] V. Paxton. An Analysis for Using Reflectors in Distributed Denial-of- Service Attacks. ACM SIGCOMM Computer Communication Review, July 21, pp [3] R. Bhagwan, S. Savage, and G. M. Voelker. Understanding Availability. Proc. of IPTPS 23. [4] K. Kutzner and T. Fuhrmann. Measuring Large Overlay Networks - The Overnet Example. KiVS 25. [5] I. Gosling. edonkey/ed2k: Study of A Young File Sharing Protocol GIAC practical repository. [6] P. Maymounkov and D. Mazieres. Kademlia: A Peer-to-peer Information System Based on the XOR Metric. IPTPS 22. [7] N. Daswani and H. Garcia-Molina. Query-Flood DoS Attacks in Gnutella. CCS 22. [8] J. Liang, R. Kumar, and K.W. Ross. The FastTrack Overlay: A Measurement Study. Computer Networks (Special Issue on Overlays) 25. [9] J. Liang, R. Kumar, Yongjian Xi, and K.W. Ross. Pollution in P2P File Sharing Systems. INFOCOM 25. [1] D. Moore, G. Voelker, and S. Savage. Inferring Internet Denial-of- Service Activity. USENIX Security, 21. [11] T. Anderson, T. Roscoe, and D. Wetherall. Preventing Internet Denialof-Service with Capabilities. HotNets, 23. [12] C. Jin, H. Wang, and K.G. Shin. Hop-count filtering: An effective defense against spoofed DDoS traffic. CCS 23. [13] M. Sung and J. Xu. IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks ICNP 22. [14] M. Ripeanu, I. Foster, and A. Iamnitchi. Mapping the Gnutella network: Properties of large-scale peer-to-peer systems and implications for system design. IEEE Internet Computing Journal, vol. 6, no. 1, 22. [15] D. Stutzbach and R. Rejaie. Characterizating Today s Gnutella Topology. IMC 25. [16] The kadc library. [17] Cache Logic. Peer-to-Peer in [18] E. Skoudis. Counter Attack. Prentice Hall 22. [19] A. Rowstron and P. Druschel. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. IFIP/ACM International Conference on Distributed Systems Platforms (Middleware) 21. [2] B. Y. Zhao, J. D. Kubiatowicz, and A. D. Joseph. Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Tech. Rep. UCB//CSD , 2.
DDoS Vulnerability Analysis of Bittorrent Protocol
DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia [email protected] Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number
Attacks Against Peer-to-peer Networks and Countermeasures
Attacks Against Peer-to-peer Networks and Countermeasures Lin Wang Helsinki University of Technology [email protected] Abstract Peer-to-peer (P2P) networks have many distinct aspects that are different from
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Announcements. No question session this week
Announcements No question session this week Stretch break DoS attacks In Feb. 2000, Yahoo s router kept crashing - Engineers had problems with it before, but this was worse - Turned out they were being
Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks
Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks Sau Fan LEE (ID: 3484135) Computer Science Department, University of Auckland Email: [email protected] Abstract A denial-of-service
Acquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
CloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
SECURING APACHE : DOS & DDOS ATTACKS - I
SECURING APACHE : DOS & DDOS ATTACKS - I In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
P2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1 Overview DDoS overview Types of attacks
Comparing Two Models of Distributed Denial of Service (DDoS) Defences
Comparing Two Models of Distributed Denial of Service (DDoS) Defences Siriwat Karndacharuk Computer Science Department The University of Auckland Email: [email protected] Abstract A Controller-Agent
Attack and Defense Techniques
Network Security Attack and Defense Techniques Anna Sperotto, Ramin Sadre Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attack Taxonomy Many different kind of
A Novel Packet Marketing Method in DDoS Attack Detection
SCI-PUBLICATIONS Author Manuscript American Journal of Applied Sciences 4 (10): 741-745, 2007 ISSN 1546-9239 2007 Science Publications A Novel Packet Marketing Method in DDoS Attack Detection 1 Changhyun
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
Denial of Service. Tom Chen SMU [email protected]
Denial of Service Tom Chen SMU [email protected] Outline Introduction Basics of DoS Distributed DoS (DDoS) Defenses Tracing Attacks TC/BUPT/8704 SMU Engineering p. 2 Introduction What is DoS? 4 types
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
A Measurement Study of Peer-to-Peer File Sharing Systems
CSF641 P2P Computing 點 對 點 計 算 A Measurement Study of Peer-to-Peer File Sharing Systems Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble Department of Computer Science and Engineering University
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Port Hopping for Resilient Networks
Port Hopping for Resilient Networks Henry C.J. Lee, Vrizlynn L.L. Thing Institute for Infocomm Research Singapore Email: {hlee, vriz}@i2r.a-star.edu.sg Abstract With the pervasiveness of the Internet,
Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack
Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Jurand Nogiec University of Illinois Fausto Paredes University of Illinois Joana Trindade University of Illinois 1. Introduction BitTorrent
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Ho-Seok Kang and Sung-Ryul Kim Konkuk University Seoul, Republic of Korea [email protected] and [email protected]
How To Protect A Dns Authority Server From A Flood Attack
the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT
DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare ([email protected]) Suvesh Pratapa ([email protected]) Modified by
Survey on DDoS Attack Detection and Prevention in Cloud
Survey on DDoS Detection and Prevention in Cloud Patel Ankita Fenil Khatiwala Computer Department, Uka Tarsadia University, Bardoli, Surat, Gujrat Abstract: Cloud is becoming a dominant computing platform
Denial of Service Attacks
(DoS) What Can be DoSed? First Internet DoS Attack The TCP State Diagram SYN Flooding Anti-Spoofing Better Data Structures Attacking Compact Data Structures Generic Solution SYN Cookies It s Not Perfect
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Cloud-based DDoS Attacks and Defenses
Cloud-based DDoS Attacks and Defenses Marwan Darwish, Abdelkader Ouda, Luiz Fernando Capretz Department of Electrical and Computer Engineering University of Western Ontario London, Canada {mdarwis3, aouda,
Filtering Based Techniques for DDOS Mitigation
Filtering Based Techniques for DDOS Mitigation Comp290: Network Intrusion Detection Manoj Ampalam DDOS Attacks: Target CPU / Bandwidth Attacker signals slaves to launch an attack on a specific target address
Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno
CSE 490K Lecture 14 Botnets and Spam Tadayoshi Kohno Some slides based on Vitaly Shmatikov s Botnets! Botnet = network of autonomous programs capable of acting on instructions Typically a large (up to
DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS
: DDOS ATTACKS DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS 1 DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS NTT is one of the largest Internet providers in the world, with a significant share of the world s
How To Understand A Network Attack
Network Security Attack and Defense Techniques Anna Sperotto (with material from Ramin Sadre) Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attacks! Many different
Network Bandwidth Denial of Service (DoS)
Network Bandwidth Denial of Service (DoS) Angelos D. Keromytis Department of Computer Science Columbia University Synonyms Network flooding attack, packet flooding attack, network DoS Related Concepts
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment
Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment Keyur Chauhan 1,Vivek Prasad 2 1 Student, Institute of Technology, Nirma University (India) 2 Assistant Professor,
Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Peer-to-Peer
Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Detection of Distributed Denial of Service Attack with Hadoop on Live Network
Detection of Distributed Denial of Service Attack with Hadoop on Live Network Suchita Korad 1, Shubhada Kadam 2, Prajakta Deore 3, Madhuri Jadhav 4, Prof.Rahul Patil 5 Students, Dept. of Computer, PCCOE,
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
Distributed Denial of Service Attack Tools
Distributed Denial of Service Attack Tools Introduction: Distributed Denial of Service Attack Tools Internet Security Systems (ISS) has identified a number of distributed denial of service tools readily
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS
TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS 2002 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor
Content Distribution Networks (CDN)
229 Content Distribution Networks (CDNs) A content distribution network can be viewed as a global web replication. main idea: each replica is located in a different geographic area, rather then in the
A Very Incomplete Diagram of Network Attacks
A Very Incomplete Diagram of Network Attacks TCP/IP Stack Reconnaissance Spoofing Tamper DoS Internet Transport Application HTTP SMTP DNS TCP UDP IP ICMP Network/Link 1) HTML/JS files 2)Banner Grabbing
Security in Structured P2P Systems
P2P Systems, Security and Overlays Presented by Vishal thanks to Dan Rubenstein Columbia University 1 Security in Structured P2P Systems Structured Systems assume all nodes behave Position themselves in
Depth-in-Defense Approach against DDoS
6th WSEAS International Conference on Information Security and Privacy, Tenerife, Spain, December 14-16, 2007 102 Depth-in-Defense Approach against DDoS Rabia Sirhindi, Asma Basharat and Ahmad Raza Cheema
GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems
GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems Daishi Kato Computer Science Department, Stanford University Visiting from NEC Corporation Abstract This paper proposes
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
A Survey of Peer-to-Peer Network Security Issues
1 of 8 1/9/2008 12:32 PM A Survey of Peer-to-Peer Network Security Issues James Li Abstract In recent years, peer-to-peer (P2P) networks have soared in popularity in the form of file sharing applications.
Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 [email protected]. DDoS and IP Traceback. Overview
DDoS and IP Traceback Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 [email protected] Louisiana State University DDoS and IP Traceback - 1 Overview Distributed Denial of Service
Gaurav Gupta CMSC 681
Gaurav Gupta CMSC 681 Abstract A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing Denial of Service for users of the
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa
Defenses against Distributed Denial of Service Attacks Adrian Perrig, Dawn Song, Avi Yaar CMU Internet Threat: DDoS Attacks Denial of Service (DoS) attack: consumption (exhaustion) of resources to deny
Analysis of Automated Model against DDoS Attacks
Analysis of Automated Model against DDoS Attacks Udaya Kiran Tupakula Vijay Varadharajan Information and Networked Systems Security Research Division of Information and Communication Sciences Macquarie
Yahoo Attack. Is DDoS a Real Problem?
Is DDoS a Real Problem? Yes, attacks happen every day One study reported ~4,000 per week 1 On a wide variety of targets Tend to be highly successful There are few good existing mechanisms to stop them
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
V.Priyadharshini 1, Dr.K.Kuppusamy 2 Dept of Computer Science & Engg Alagappa University, Karaikudi,Tamilnadu,India
Applications (IJERA) ISSN: 2248-9622 www.ijera.com Prevention of DDOS Attacks using New Cracking Algorithm V.Priyadharshini 1, Dr.K.Kuppusamy 2 Dept of Computer Science & Engg Alagappa University, Karaikudi,Tamilnadu,India
Distributed Hash Tables in P2P Systems - A literary survey
Distributed Hash Tables in P2P Systems - A literary survey Timo Tanner Helsinki University of Technology [email protected] Abstract Distributed Hash Tables (DHT) are algorithms used in modern peer-to-peer
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks
Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Chin-Tser Huang, Prasanth Kalakota, Alexander B. Alexandrov Department of Computer Science and Engineering University
Survey on DDoS Attack in Cloud Environment
Available online at www.ijiere.com International Journal of Innovative and Emerging Research in Engineering e-issn: 2394-3343 p-issn: 2394-5494 Survey on DDoS in Cloud Environment Kirtesh Agrawal and Nikita
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks
Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,
Surviving DNS DDoS Attacks. Introducing self-protecting servers
Introducing self-protecting servers Background The current DNS environment is subject to a variety of distributed denial of service (DDoS) attacks, including reflected floods, amplification attacks, TCP
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
Packet-Marking Scheme for DDoS Attack Prevention
Abstract Packet-Marking Scheme for DDoS Attack Prevention K. Stefanidis and D. N. Serpanos {stefanid, serpanos}@ee.upatras.gr Electrical and Computer Engineering Department University of Patras Patras,
How Cisco IT Protects Against Distributed Denial of Service Attacks
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
How To Defend Against A Distributed Denial Of Service Attack (Ddos)
International Journal of Science and Modern Engineering (IJISME) Survey on DDoS Attacks and its Detection & Defence Approaches Nisha H. Bhandari Abstract In Cloud environment, cloud servers providing requested
Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Part I: Attack Prevention Network Security Chapter 9 Attack prevention, detection and response Part Part I:
CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24
Introduction to Computer Networks Lecture24 Network security (continued) Key distribution Secure Shell Overview Authentication Practical issues Firewalls Denial of Service Attacks Definition Examples Key
The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar [email protected] [email protected] Gothenburg, May
Efficient Detection of Ddos Attacks by Entropy Variation
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,
A Flow-based Method for Abnormal Network Traffic Detection
A Flow-based Method for Abnormal Network Traffic Detection Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, and James W. Hong Dept. of Computer Science and Engineering POSTECH {mount,
Safeguards Against Denial of Service Attacks for IP Phones
W H I T E P A P E R Denial of Service (DoS) attacks on computers and infrastructure communications systems have been reported for a number of years, but the accelerated deployment of Voice over IP (VoIP)
BotTorrent: Misusing BitTorrent to Launch DDoS Attacks
BotTorrent: Misusing BitTorrent to Launch DDoS Attacks Karim El Defrawy, Minas Gjoka and Athina Markopoulou University of California, Irvine {keldefra, mgjoka, athina}@uci.edu Abstract BitTorrent is currently
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
Attack Lab: Attacks on TCP/IP Protocols
Laboratory for Computer Security Education 1 Attack Lab: Attacks on TCP/IP Protocols Copyright c 2006-2010 Wenliang Du, Syracuse University. The development of this document is funded by the National Science
Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg
Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona [email protected] Copyright
Denial of Service Resilience in Peer to Peer. D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, W. Zwaenepoel Presented by: Ahmet Canik
Denial of Service Resilience in Peer to Peer File Sharing Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, W. Zwaenepoel Presented by: Ahmet Canik Outline 1. Background on P2P systems 2. File
VALIDATING DDoS THREAT PROTECTION
VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to
