Prashant Dewan, Divya Naidu Kolar Sunder, David M. Durham
{"title":"使用互联网密钥交换协议的拒绝服务攻击","authors":"Prashant Dewan, Divya Naidu Kolar Sunder, David M. Durham","doi":"10.1109/CCNC08.2007.111","DOIUrl":null,"url":null,"abstract":"In this paper we answer two questions: 1) How can an attacker push the CPU utilization of a state-of-art Internet Key Exchange (IKE) responders to 100% thereby inflecting a Denial of Service (DoS) attack and 2) What are the mitigation mechanisms that can be deployed on IP networks without modifying the protocol? We emulated the DoS attacks in our test lab. We outline our experiments and present the results.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"121 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Denial of Service Attacks Using Internet Key Exchange Protocol\",\"authors\":\"Prashant Dewan, Divya Naidu Kolar Sunder, David M. Durham\",\"doi\":\"10.1109/CCNC08.2007.111\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we answer two questions: 1) How can an attacker push the CPU utilization of a state-of-art Internet Key Exchange (IKE) responders to 100% thereby inflecting a Denial of Service (DoS) attack and 2) What are the mitigation mechanisms that can be deployed on IP networks without modifying the protocol? We emulated the DoS attacks in our test lab. We outline our experiments and present the results.\",\"PeriodicalId\":183858,\"journal\":{\"name\":\"2008 5th IEEE Consumer Communications and Networking Conference\",\"volume\":\"121 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 5th IEEE Consumer Communications and Networking Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCNC08.2007.111\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 5th IEEE Consumer Communications and Networking Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCNC08.2007.111","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Denial of Service Attacks Using Internet Key Exchange Protocol
In this paper we answer two questions: 1) How can an attacker push the CPU utilization of a state-of-art Internet Key Exchange (IKE) responders to 100% thereby inflecting a Denial of Service (DoS) attack and 2) What are the mitigation mechanisms that can be deployed on IP networks without modifying the protocol? We emulated the DoS attacks in our test lab. We outline our experiments and present the results.