Assessment of a vulnerability in iterative servers enabling low-rate dos attacks

  • Authors:
  • Gabriel Maciá-Fernández;Jesús E. Díaz-Verdejo;Pedro García-Teodoro

  • Affiliations:
  • Dep. of Signal Theory, Telematics and Communications, University of Granada, Granada, (Spain);Dep. of Signal Theory, Telematics and Communications, University of Granada, Granada, (Spain);Dep. of Signal Theory, Telematics and Communications, University of Granada, Granada, (Spain)

  • Venue:
  • ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this work, a vulnerability in iterative servers is described and exploited. The vulnerability is related to the possibility of acquiring some statistics about the time between two consecutive service responses generated by the server under the condition that the server has always requests to serve. By exploiting this knowledge, an intruder is able to carry out a DoS attack characterized by a relatively low-rate traffic destined to the server. Besides the presentation of the vulnerability, an implementation of the attack has been simulated and tested in a real environment. The results obtained show an important impact in the performance of the service provided by the server to legitimate users (DoS attack) while a low effort, in terms of volume of generated traffic, is necessary for the attacker. Besides, this attack compares favourably with a naive (brute-force) attack with the same traffic rate. Therefore, the proposed attack would easily pass through most of current IDSs, designed to detect high volumes of traffic.