Towards the perfect DDoS attack: The perfect storm

Amey Shevtekar, Nirwan Ansari, Roger Karrer

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper proposes a novel model for instigating the "perfect" DDoS attack. Our model uses a combination of network feedback and coordination of attack rates and protocols to achieve a high level of service deniability and low detectability. We demonstrate via extensive simulations that our attack model achieves a higher impact as compared to the Shrew and the RoQ (Reduction of Quality) attacks while the detectability is low. The model adopts botnets in executing/realizing the perfect storm/attack in a real network. We show that executing the attack is not difficult at all. We then briefly describe failures of recent and most relevant detection approaches in mitigating these attacks. The failures of these schemes demonstrate low detectability of our proposed "perfect storm".

Original languageEnglish (US)
Title of host publication2009 IEEE Sarnoff Symposium, SARNOFF 2009 - Conference Proceedings
DOIs
StatePublished - 2009
Event2009 IEEE Sarnoff Symposium, SARNOFF 2009 - Princeton, NJ, United States
Duration: Mar 30 2009Apr 1 2009

Publication series

Name2009 IEEE Sarnoff Symposium, SARNOFF 2009 - Conference Proceedings

Other

Other2009 IEEE Sarnoff Symposium, SARNOFF 2009
Country/TerritoryUnited States
CityPrinceton, NJ
Period3/30/094/1/09

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Communication

Keywords

  • Low rate DoS
  • RoQ
  • TCP
  • VoIP

Fingerprint

Dive into the research topics of 'Towards the perfect DDoS attack: The perfect storm'. Together they form a unique fingerprint.

Cite this