Controlling high bandwidth aggregates in the network
ACM SIGCOMM Computer Communication Review
Optimizing BGP security by exploiting path stability
Proceedings of the 13th ACM conference on Computer and communications security
The detection of malicious misrouting of packets on internet
PDCN'07 Proceedings of the 25th conference on Proceedings of the 25th IASTED International Multi-Conference: parallel and distributed computing and networks
Operational fault detection in network infrastructure
ICCOM'08 Proceedings of the 12th WSEAS international conference on Communications
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
CIIT '07 The Sixth IASTED International Conference on Communications, Internet, and Information Technology
Secure routing in ad hoc networks and a related intrusion detection problem
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Hi-index | 0.00 |
Among various types of denial of service attacks, "dropping attack" is probably the most difficult one to handle. This paper explores the negative impacts of packet dropping attacks and a method to detect such attacks. First, three dropping patterns are classified and investigated. We demonstrate that attackers can choose different dropping patterns to degrade TCP service to different levels, and selectively dropping a very, small number of packets can result in severe damage to TCP performance. Second, we show that a hacker can utilize a DDoS attack tool to control a "uncompromised" router to emulate dropping attacks. This proves that dropping attacks are indeed practically very possible to happen in today's Internet environment. Third, we present a statistical analysis module for the detection of TCP packet dropping attacks. Three measures, session delay, the position and the number of packet reorderings, have been implemented in the statistical module. This paper has evaluated and compared their detection performance.