Open Access Open Access  Restricted Access Subscription or Fee Access

Basic Review of Low Rate Denial of Service Attack on Wired and Wireless Networks

Yousef M. Jaradat(1*), Mohammad Masoud(2), Ismael Jannoud(3), Hussein Azzawi(4)

(1) Electrical Engineering/Communications and Computer Department, Faculty of Engineering and Technology, Al-Zaytoonah University of Jordan, Jordan
(2) Electrical Engineering/Communications and Computer Department, Faculty of Engineering and Technology, Al-Zaytoonah University of Jordan, Jordan
(3) Electrical Engineering/Communications and Computer Department, Faculty of Engineering and Technology, Al-Zaytoonah University of Jordan, Jordan
(4) Klipsch School of Electrical and Computer Engineering, United States
(*) Corresponding author


DOI: https://doi.org/10.15866/irecap.v6i6.10932

Abstract


Denial of service (DoS) attack is a serious security threat in networks. It threatens the normal operation of networks by consuming their underlying links/channels bandwidths, devices’ memory and CPU cycles, and then denies access to network resources to legitimate users. In this paper a special type of DoS attacks is investigated, the low rate DoS (LR-DoS) attack. LR-DoS attack is unique in that it is easy to launch and automated, hard to detect and respond to. LR-DoS attack mainly targeted the normal operation of network protocols and services. LR-DoS attack utilizes vulnerabilities in the targeted network protocol and service. TCP targeted LR-DoS attack in wired networks and routing protocol targeted LR-DoS attack in wireless networks are reviewed. It was shown that to launch a successful LR-DoS attack in wired and wireless network, a deep understanding of the internal operations and timer-based strategies are needed for the targeted network protocols and services in any layer of the Internet protocol stack.
Copyright © 2016 Praise Worthy Prize - All rights reserved.

Keywords


Denial of Service Attack; Low-Rate DoS; NFJ

Full Text:

PDF


References


Rocky KC Chang. Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Communications Magazine, 40(10):42—51, 2002.
http://dx.doi.org/10.1109/mcom.2002.1039856

M Balakrishnan, Hong Huang, Rafael Asorey-Cacheda, Satyajayant Misra, Sandeep Pawar, Yousef Jaradat. Measures and countermeasures for null frequency jamming of on-demand routing protocols in wireless ad hoc networks. IEEE Transactions on Wireless Communications, 11(11):3860—3868, 2012.
http://dx.doi.org/10.1109/glocom.2011.6133614

Shruti Lall, BTJ Maharaj, PA Jansen van Vuuren. Null-frequency jamming of a proactive routing protocol in wireless mesh networks. Journal of Network and Computer Applications, 61:133—141, 2016.
http://dx.doi.org/10.1016/j.jnca.2015.10.009

Mark Allman, Vern Paxson, Ethan Blanton. "TCP congestion control". 2009.
http://dx.doi.org/10.17487/rfc5681

A Behrouz Forouzan. Data Communications & Networking (sie). Tata McGraw-Hill Education, 2006.
http://dx.doi.org/10.4135/9781473974463

James F Kurose, Keith W Ross. Computer Networking: A Top-Down Approach: International Edition. Pearson Higher Ed, 2013.
http://dx.doi.org/10.1109/2.976930

Kevin Fall, Sally Floyd. Simulation-based comparisons of Tahoe, Reno and SACK TCP. ACM SIGCOMM Computer Communication Review, 26(3):5—21, 1996.
http://dx.doi.org/10.1145/235160.235162

I. Abdeljaouad, H. Rachidi, S. Fernandes, A. Karmouch. Performance analysis of modern TCP variants: A comparison of Cubic, Compound and New Reno. Communications (QBSC), 2010 25th Biennial Symposium on:80-83, 2010.
http://dx.doi.org/10.1109/bsc.2010.5472999

Vern Paxson, Mark Allman, Jerry Chu, Matt Sargent. Computing TCP's retransmission timer. 2011.
http://dx.doi.org/10.17487/rfc6298

Mark Allman, Vern Paxson. On estimating end-to-end network path properties. ACM SIGCOMM Computer Communication Review, 31(2 supplement):124—151, 2001.
http://dx.doi.org/10.1145/844193.844203

Van Jacobson. Congestion avoidance and control. ACM SIGCOMM computer communication review, 18(4):314—329, 1988.
http://dx.doi.org/10.1145/52325.52356

Arash Dana, Ahmad Malekloo. Performance comparison between active and passive queue management. IJCSI:18, 2010.
http://dx.doi.org/10.3844/jcssp.2008.1020.1023

Sahil Kochher, Malti Sanghal, Rajesh Kochher, Gurnam Singh. A Review on Active and Passive Queuing Techniques.
http://dx.doi.org/10.5120/21045-3676

Kaiyu Zhou, Kwan L Yeung, Victor OK Li. Nonlinear RED: A simple yet efficient active queue management scheme. Computer Networks, 50(18):3784—3794, 2006.
http://dx.doi.org/10.1016/j.comnet.2006.04.007

Sally Floyd, Van Jacobson. Random early detection gateways for congestion avoidance. IEEE/ACM Transactions on networking, 1(4):397—413, 1993.
http://dx.doi.org/10.1109/90.251892

Meriel Huggard, Mathieu Robin, Arkaitz Bitorika, Ciarán McGoldrick. Performance evaluation of fairness-oriented active queue management schemes. Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, 2004.(MASCOTS 2004). Proceedings. The IEEE Computer Society's 12th Annual International Symposium on:105—112, 2004.
http://dx.doi.org/10.1109/mascot.2004.1348187

Simon Heron. Denial of service: motivations and trends. Network Security, 2010(5):10—12, 2010.
http://dx.doi.org/10.1016/s1353-4858(10)70056-8

Christos Douligeris, Aikaterini Mitrokotsa. DDoS attacks and defense mechanisms: classification and state-of-the-art. Computer Networks, 44(5):643—666, 2004.
http://dx.doi.org/10.1016/j.comnet.2003.10.003

Xianjun Geng, Andrew B Whinston. Defeating distributed denial of service attacks. IT Professional, 2(4):36—42, 2000.
http://dx.doi.org/10.1109/6294.869381

M Nene Rajkumar. A Survey on Latest DoS Attacks: Classification and Defense Mechanisms. IJIRCCE, 2013.
http://dx.doi.org/10.1080/02564602.2016.1192964

Xiao-ming LIU, Gong CHENG, LI Qi, Miao ZHANG. A comparative study on flood DoS and low-rate DoS attacks. The Journal of China Universities of Posts and Telecommunications, 19:116—121, 2012.
http://dx.doi.org/10.1016/s1005-8885(11)60458-5

Xiapu Luo, Rocky KC Chang. On a New Class of Pulsing Denial-of-Service Attacks and the Defense. NDSS, 2005.
http://dx.doi.org/10.1155/2009/256821

Mina Guirguis, Azer Bestavros, Ibrahim Matta. Exploiting the transients of adaptation for RoQ attacks on Internet resources. Network Protocols, 2004. ICNP 2004. Proceedings of the 12th IEEE International Conference on: 184—195, 2004.
http://dx.doi.org/10.1109/icnp.2004.1348109

Sudarshan Prasad, David J Thuente. Jamming attacks in 802.11 g A cognitive radio based approach. 2011-MILCOM 2011 Military Communications Conference: 1219—1224, 2011.
http://dx.doi.org/10.1109/milcom.2011.6127467

Clayton W Commander, Panos M Pardalos, Valeriy Ryabchenko, Stan Uryasev, Grigoriy Zrazhevsky. The wireless network jamming problem. Journal of Combinatorial Optimization, 14(4):481—498, 2007.
http://dx.doi.org/10.1007/s10878-007-9071-7

Kanika Grover, Alvin Lim, Qing Yang. Jamming and anti—jamming techniques in wireless networks: a survey. International Journal of Ad Hoc and Ubiquitous Computing, 17(4):197—215, 2014.
http://dx.doi.org/10.1504/ijahuc.2014.066419

Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wood. The feasibility of launching and detecting jamming attacks in wireless networks. Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing: 46—57, 2005.
http://dx.doi.org/10.1145/1062689.1062697

Konstantinos Pelechrinis, Marios Iliofotou, Srikanth V Krishnamurthy. Denial of service attacks in wireless networks: The case of jammers. IEEE Communications Surveys & Tutorials, 13(2):245—257, 2011.
http://dx.doi.org/10.1109/surv.2011.041110.00022

Manikanden Balakrishnan, Hong Huang, Satyajayant Misra, Rafael Asorey-Cacheda, Yousef Jaradat, Sandeep Pawar. Null Frequency Jamming of Dynamic Routing in Wireless Ad Hoc Networks. Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE:1—5, 2011.
http://dx.doi.org/10.1109/glocom.2011.6133614

Jae-Joon Lee, Jaesung Lim. Effective and efficient jamming based on routing in wireless ad hoc networks. IEEE Communications Letters, 16(11):1903—1906, 2012.
http://dx.doi.org/10.1109/lcomm.2012.091712.121811

D Johnson, Y Hu, D Maltz. RFC: 4728. The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPV4, 2007.
http://dx.doi.org/10.17487/rfc4728

Thomas Clausen, Philippe Jacquet. RFC 3626: Optimized link state routing protocol (OLSR). IETF, October, 4, 2003.
http://dx.doi.org/10.17487/rfc3626

Thomas Clausen, Christopher Dearlove, Philippe Jacquet, Ulrich Herberg. The optimized link state routing protocol version 2., 2014.
http://dx.doi.org/10.17487/rfc7181

Azzedine Boukerche, Begumhan Turgut, Nevin Aydin, Mohammad Z Ahmad, Ladislau Bölöni, Damla Turgut. Routing protocols in ad hoc networks: A survey. Computer networks, 55(13):3032—3080, 2011.
http://dx.doi.org/10.1016/j.comnet.2011.05.010

IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 2007.
http://dx.doi.org/10.1109/ieeestd.2005.97890

Aleksandar Kuzmanovic, Edward W Knightly. Low-rate TCP-targeted denial of service attacks and counter strategies. IEEE/ACM Transactions on Networking (TON), 14(4):683—696, 2006.
http://dx.doi.org/10.1109/tnet.2006.880180

Changwang Zhang, Jianping Yin, Zhiping Cai, Weifeng Chen. RRED: robust RED algorithm to counter low-rate denial-of-service attacks. IEEE Communications Letters, 14(5):489—491, 2010.
http://dx.doi.org/10.1109/lcomm.2010.05.091407

Haibin Sun, John CS Lui, David KY Yau. Distributed mechanism in detecting and defending against the low-rate TCP attack. Computer Networks, 50(13):2312—2330, 2006.
http://dx.doi.org/10.1016/j.comnet.2005.09.016


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2020 Praise Worthy Prize