Open Access Open Access  Restricted Access Subscription or Fee Access

Basic Review of Low Rate Denial of Service Attack on Wired and Wireless Networks

Yousef M. Jaradat(1*), Mohammad Masoud(2), Ismael Jannoud(3), Hussein Azzawi(4)

(1) Electrical Engineering/Communications and Computer Department, Faculty of Engineering and Technology, Al-Zaytoonah University of Jordan, Jordan
(2) Electrical Engineering/Communications and Computer Department, Faculty of Engineering and Technology, Al-Zaytoonah University of Jordan, Jordan
(3) Electrical Engineering/Communications and Computer Department, Faculty of Engineering and Technology, Al-Zaytoonah University of Jordan, Jordan
(4) Klipsch School of Electrical and Computer Engineering, United States
(*) Corresponding author



Denial of service (DoS) attack is a serious security threat in networks. It threatens the normal operation of networks by consuming their underlying links/channels bandwidths, devices’ memory and CPU cycles, and then denies access to network resources to legitimate users. In this paper a special type of DoS attacks is investigated, the low rate DoS (LR-DoS) attack. LR-DoS attack is unique in that it is easy to launch and automated, hard to detect and respond to. LR-DoS attack mainly targeted the normal operation of network protocols and services. LR-DoS attack utilizes vulnerabilities in the targeted network protocol and service. TCP targeted LR-DoS attack in wired networks and routing protocol targeted LR-DoS attack in wireless networks are reviewed. It was shown that to launch a successful LR-DoS attack in wired and wireless network, a deep understanding of the internal operations and timer-based strategies are needed for the targeted network protocols and services in any layer of the Internet protocol stack.
Copyright © 2016 Praise Worthy Prize - All rights reserved.


Denial of Service Attack; Low-Rate DoS; NFJ

Full Text:



Rocky KC Chang. Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Communications Magazine, 40(10):42—51, 2002.

M Balakrishnan, Hong Huang, Rafael Asorey-Cacheda, Satyajayant Misra, Sandeep Pawar, Yousef Jaradat. Measures and countermeasures for null frequency jamming of on-demand routing protocols in wireless ad hoc networks. IEEE Transactions on Wireless Communications, 11(11):3860—3868, 2012.

Shruti Lall, BTJ Maharaj, PA Jansen van Vuuren. Null-frequency jamming of a proactive routing protocol in wireless mesh networks. Journal of Network and Computer Applications, 61:133—141, 2016.

Mark Allman, Vern Paxson, Ethan Blanton. "TCP congestion control". 2009.

A Behrouz Forouzan. Data Communications & Networking (sie). Tata McGraw-Hill Education, 2006.

James F Kurose, Keith W Ross. Computer Networking: A Top-Down Approach: International Edition. Pearson Higher Ed, 2013.

Kevin Fall, Sally Floyd. Simulation-based comparisons of Tahoe, Reno and SACK TCP. ACM SIGCOMM Computer Communication Review, 26(3):5—21, 1996.

I. Abdeljaouad, H. Rachidi, S. Fernandes, A. Karmouch. Performance analysis of modern TCP variants: A comparison of Cubic, Compound and New Reno. Communications (QBSC), 2010 25th Biennial Symposium on:80-83, 2010.

Vern Paxson, Mark Allman, Jerry Chu, Matt Sargent. Computing TCP's retransmission timer. 2011.

Mark Allman, Vern Paxson. On estimating end-to-end network path properties. ACM SIGCOMM Computer Communication Review, 31(2 supplement):124—151, 2001.

Van Jacobson. Congestion avoidance and control. ACM SIGCOMM computer communication review, 18(4):314—329, 1988.

Arash Dana, Ahmad Malekloo. Performance comparison between active and passive queue management. IJCSI:18, 2010.

Sahil Kochher, Malti Sanghal, Rajesh Kochher, Gurnam Singh. A Review on Active and Passive Queuing Techniques.

Kaiyu Zhou, Kwan L Yeung, Victor OK Li. Nonlinear RED: A simple yet efficient active queue management scheme. Computer Networks, 50(18):3784—3794, 2006.

Sally Floyd, Van Jacobson. Random early detection gateways for congestion avoidance. IEEE/ACM Transactions on networking, 1(4):397—413, 1993.

Meriel Huggard, Mathieu Robin, Arkaitz Bitorika, Ciarán McGoldrick. Performance evaluation of fairness-oriented active queue management schemes. Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, 2004.(MASCOTS 2004). Proceedings. The IEEE Computer Society's 12th Annual International Symposium on:105—112, 2004.

Simon Heron. Denial of service: motivations and trends. Network Security, 2010(5):10—12, 2010.

Christos Douligeris, Aikaterini Mitrokotsa. DDoS attacks and defense mechanisms: classification and state-of-the-art. Computer Networks, 44(5):643—666, 2004.

Xianjun Geng, Andrew B Whinston. Defeating distributed denial of service attacks. IT Professional, 2(4):36—42, 2000.

M Nene Rajkumar. A Survey on Latest DoS Attacks: Classification and Defense Mechanisms. IJIRCCE, 2013.

Xiao-ming LIU, Gong CHENG, LI Qi, Miao ZHANG. A comparative study on flood DoS and low-rate DoS attacks. The Journal of China Universities of Posts and Telecommunications, 19:116—121, 2012.

Xiapu Luo, Rocky KC Chang. On a New Class of Pulsing Denial-of-Service Attacks and the Defense. NDSS, 2005.

Mina Guirguis, Azer Bestavros, Ibrahim Matta. Exploiting the transients of adaptation for RoQ attacks on Internet resources. Network Protocols, 2004. ICNP 2004. Proceedings of the 12th IEEE International Conference on: 184—195, 2004.

Sudarshan Prasad, David J Thuente. Jamming attacks in 802.11 g A cognitive radio based approach. 2011-MILCOM 2011 Military Communications Conference: 1219—1224, 2011.

Clayton W Commander, Panos M Pardalos, Valeriy Ryabchenko, Stan Uryasev, Grigoriy Zrazhevsky. The wireless network jamming problem. Journal of Combinatorial Optimization, 14(4):481—498, 2007.

Kanika Grover, Alvin Lim, Qing Yang. Jamming and anti—jamming techniques in wireless networks: a survey. International Journal of Ad Hoc and Ubiquitous Computing, 17(4):197—215, 2014.

Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wood. The feasibility of launching and detecting jamming attacks in wireless networks. Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing: 46—57, 2005.

Konstantinos Pelechrinis, Marios Iliofotou, Srikanth V Krishnamurthy. Denial of service attacks in wireless networks: The case of jammers. IEEE Communications Surveys & Tutorials, 13(2):245—257, 2011.

Manikanden Balakrishnan, Hong Huang, Satyajayant Misra, Rafael Asorey-Cacheda, Yousef Jaradat, Sandeep Pawar. Null Frequency Jamming of Dynamic Routing in Wireless Ad Hoc Networks. Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE:1—5, 2011.

Jae-Joon Lee, Jaesung Lim. Effective and efficient jamming based on routing in wireless ad hoc networks. IEEE Communications Letters, 16(11):1903—1906, 2012.

D Johnson, Y Hu, D Maltz. RFC: 4728. The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPV4, 2007.

Thomas Clausen, Philippe Jacquet. RFC 3626: Optimized link state routing protocol (OLSR). IETF, October, 4, 2003.

Thomas Clausen, Christopher Dearlove, Philippe Jacquet, Ulrich Herberg. The optimized link state routing protocol version 2., 2014.

Azzedine Boukerche, Begumhan Turgut, Nevin Aydin, Mohammad Z Ahmad, Ladislau Bölöni, Damla Turgut. Routing protocols in ad hoc networks: A survey. Computer networks, 55(13):3032—3080, 2011.

IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 2007.

Aleksandar Kuzmanovic, Edward W Knightly. Low-rate TCP-targeted denial of service attacks and counter strategies. IEEE/ACM Transactions on Networking (TON), 14(4):683—696, 2006.

Changwang Zhang, Jianping Yin, Zhiping Cai, Weifeng Chen. RRED: robust RED algorithm to counter low-rate denial-of-service attacks. IEEE Communications Letters, 14(5):489—491, 2010.

Haibin Sun, John CS Lui, David KY Yau. Distributed mechanism in detecting and defending against the low-rate TCP attack. Computer Networks, 50(13):2312—2330, 2006.


  • There are currently no refbacks.

Please send any question about this web site to
Copyright © 2005-2020 Praise Worthy Prize