Low rate dos attack to monoprocess servers

  • Authors:
  • Gabriel Maciá-Fernández;Jesús E. Díaz-Verdejo;Pedro García-Teodoro

  • Affiliations:
  • Dpt. of Signal Theory, Telematics and Communications – University of Granada, Granada, Spain;Dpt. of Signal Theory, Telematics and Communications – University of Granada, Granada, Spain;Dpt. of Signal Theory, Telematics and Communications – University of Granada, Granada, Spain

  • Venue:
  • SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this work, we present a vulnerability in monoprocess or monothreaded servers that allows the execution of DoS attacks with the peculiarity that they are generated by low rate traffic. This feature makes the attack less vulnerable to detection by current IDS systems, which usually expect high rate traffic. The intruder can take advantage of some knowledge about the inter-output times in the server to build the attack. We have simulated and tested it in a real environment, obtaining worrying conclusions due to the efficiency achieved by the attack, with low effort from the attacker.