Counter-Flooding: DoS Protection for Public Key Handshakes in LANs

  • Authors:
  • Yves Igor Jerschow;Björn Scheuermann;Martin Mauve

  • Affiliations:
  • -;-;-

  • Venue:
  • ICNS '09 Proceedings of the 2009 Fifth International Conference on Networking and Services
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensive task compared to symmetric key operations and may become the target for Denial of Service (DoS) attacks, where the adversary floods the victim host with fake signature packets trying to overload it. In this paper we present counter-flooding, a new defense mechanism against DoS attacks which exploit the lack of initial address authenticity in LANs. A benign host having a signature packet addressed to a host which is currently under attack ensures the processing of its packet by flooding copies of this packet for a short period of time itself. The key idea is for the victim host to verify only a fixed number of signatures per time period without becoming overloaded and to select those packets for verification which have the largest number of duplicates. Under weak assumptions we prove that the packet from the benign host will be among them. We derive bounds for our counter-flooding mechanism to succeed and perform experiments with Ethernet switches to study the bandwidth division between concurrent flows under overload conditions.