Low rate TCP denial-of-service attack detection at edge routers

Amey Shevtekar, Karunakar Anantharam, Nirwan Ansari

Research output: Contribution to journalArticlepeer-review

94 Scopus citations

Abstract

Low rate TCP Denial-of-Service attacks are a new type of DoS attacks that are carefully orchestrated to exploit the fixed minimum TCP RTO property, and thereby deny services to legitimate users. This type of attacks is different from traditional flood-based attacks, and hence conventional solutions to detect these attacks are not applicable. We propose a novel approach to detect these attack flows at edge routers. A flow exhibiting a periodic pattern is marked malicious if its burst length is greater than or equal to RTTs of other connections with the same server, and its time period is equal to the fixed minimum RTO. A carefully designed light weight data structure is proposed to store the necessary flow history at edge routers. Simulation results show that such flows can be detected by our proposed approach, which does not require any modification to TCP congestion control algorithms like randomizing the fixed minimum RTO.

Original languageEnglish (US)
Pages (from-to)363-365
Number of pages3
JournalIEEE Communications Letters
Volume9
Issue number4
DOIs
StatePublished - Apr 2005

All Science Journal Classification (ASJC) codes

  • Modeling and Simulation
  • Computer Science Applications
  • Electrical and Electronic Engineering

Keywords

  • DoS
  • RTO
  • RTT
  • Router
  • TCP

Fingerprint

Dive into the research topics of 'Low rate TCP denial-of-service attack detection at edge routers'. Together they form a unique fingerprint.

Cite this