Denial of Service Attacks in Networks with Tiny Buffers

V. Havary-Nassab, A. Koulakezian, Y. Ganjali
{"title":"Denial of Service Attacks in Networks with Tiny Buffers","authors":"V. Havary-Nassab, A. Koulakezian, Y. Ganjali","doi":"10.1109/INFCOMW.2009.5072124","DOIUrl":null,"url":null,"abstract":"Recently, several papers have studied the possibility of shrinking buffer sizes in Internet core routers to just a few dozen packets under certain constraints. If proven right, these results can open doors to building all-optical routers, since a major bottleneck in building such routers is the lack of large optical memories. However, reducing buffer sizes might pose new security risks: it is much easier to fill up tiny buffers, and thus organizing Denial of Service (DoS) attacks seems easier in a network with tiny buffers. To the best of our knowledge, such risks have not been studied before; all the focus has been on performance issues such as throughput, drop rate, and flow completion times. In this paper, we study DoS attacks in the context of networks with tiny buffers.We show that even though it is easier to fill up tiny buffers, synchronizing flows is more difficult. Therefore to reduce the network throughput, the attacker needs to utilize attacks with high packet injection rates. Since such attacks are easily detected, we conclude that DoS attacks are in fact more difficult in networks with tiny buffers.","PeriodicalId":252414,"journal":{"name":"IEEE INFOCOM Workshops 2009","volume":"8 s4","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE INFOCOM Workshops 2009","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFCOMW.2009.5072124","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Recently, several papers have studied the possibility of shrinking buffer sizes in Internet core routers to just a few dozen packets under certain constraints. If proven right, these results can open doors to building all-optical routers, since a major bottleneck in building such routers is the lack of large optical memories. However, reducing buffer sizes might pose new security risks: it is much easier to fill up tiny buffers, and thus organizing Denial of Service (DoS) attacks seems easier in a network with tiny buffers. To the best of our knowledge, such risks have not been studied before; all the focus has been on performance issues such as throughput, drop rate, and flow completion times. In this paper, we study DoS attacks in the context of networks with tiny buffers.We show that even though it is easier to fill up tiny buffers, synchronizing flows is more difficult. Therefore to reduce the network throughput, the attacker needs to utilize attacks with high packet injection rates. Since such attacks are easily detected, we conclude that DoS attacks are in fact more difficult in networks with tiny buffers.
小缓冲区网络中的拒绝服务攻击
最近,有几篇论文研究了在某些限制条件下将互联网核心路由器的缓冲区大小缩小到几十个数据包的可能性。如果被证明是正确的,这些结果将为构建全光路由器打开大门,因为构建这种路由器的主要瓶颈是缺乏大的光存储器。然而,减小缓冲区大小可能会带来新的安全风险:填充小缓冲区要容易得多,因此在具有小缓冲区的网络中组织拒绝服务(DoS)攻击似乎更容易。据我们所知,这种风险以前从未被研究过;所有的焦点都集中在性能问题上,比如吞吐量、丢包率和流完成时间。在本文中,我们研究了在具有小缓冲区的网络环境下的DoS攻击。我们表明,尽管填充小缓冲区更容易,但同步流更困难。因此,为了降低网络吞吐量,攻击者需要利用高注包速率的攻击。由于这种攻击很容易被检测到,我们得出的结论是,DoS攻击实际上在具有微小缓冲区的网络中更加困难。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信