Prashant Dewan, Divya Naidu Kolar Sunder, David M. Durham
{"title":"Denial of Service Attacks Using Internet Key Exchange Protocol","authors":"Prashant Dewan, Divya Naidu Kolar Sunder, David M. Durham","doi":"10.1109/CCNC08.2007.111","DOIUrl":null,"url":null,"abstract":"In this paper we answer two questions: 1) How can an attacker push the CPU utilization of a state-of-art Internet Key Exchange (IKE) responders to 100% thereby inflecting a Denial of Service (DoS) attack and 2) What are the mitigation mechanisms that can be deployed on IP networks without modifying the protocol? We emulated the DoS attacks in our test lab. We outline our experiments and present the results.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"121 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 5th IEEE Consumer Communications and Networking Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCNC08.2007.111","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
In this paper we answer two questions: 1) How can an attacker push the CPU utilization of a state-of-art Internet Key Exchange (IKE) responders to 100% thereby inflecting a Denial of Service (DoS) attack and 2) What are the mitigation mechanisms that can be deployed on IP networks without modifying the protocol? We emulated the DoS attacks in our test lab. We outline our experiments and present the results.