2006
DOI: 10.1109/tnet.2006.880180
|View full text |Cite
|
Sign up to set email alerts
|

Low-rate TCP-targeted denial of service attacks and counter strategies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
91
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 171 publications
(101 citation statements)
references
References 31 publications
1
91
0
Order By: Relevance
“…Low rate denial of service attacks is tough to detect. In this paper [36], low rate DDoS detection is tried using a combination of analytical modeling, experiments, and simulations. Low rate DOS attacks exploit TCP"s retransmission timeout mechanism.…”
Section: Figure30 "Low Rate Ddos Time Diagram"mentioning
confidence: 99%
“…Low rate denial of service attacks is tough to detect. In this paper [36], low rate DDoS detection is tried using a combination of analytical modeling, experiments, and simulations. Low rate DOS attacks exploit TCP"s retransmission timeout mechanism.…”
Section: Figure30 "Low Rate Ddos Time Diagram"mentioning
confidence: 99%
“…The goal of these attacks is to exhaust resources in order to prevent the victim from processing new incoming connection requests. Transport layer low rate attacks [30] exploit TCP's retransmission timeout (RTO) dynamics. An attacker repeatedly sends short high-rate packet bursts, which produce packet losses (i. e., timeouts) and thus make the victim double the RTO of other TCP connections [37].…”
Section: B Analysismentioning
confidence: 99%
“…A number of defense mechanisms have been proposed for wireline networks, such as the pushback and traceback mechanisms [13,25,27]. Another class of DoS attacks is based on the low-rate, high-volume TCP attack [18], in which an attacker periodically generates high-volume packet bursts in order to force all TCP flows to repeatedly enter the retransmission timeout state. In this paper, we describe a low-rate, low-volume signaling attack that targets 3G or equivalent wireless infrastructures.…”
Section: Related Workmentioning
confidence: 99%