Performance Analysis of TCP/AQM Under Denial-of-Service Attacks

  • Authors:
  • Xiapu Luo;Rocky K. C. Chang;Edmond W. W. Chan

  • Affiliations:
  • Department of Computing, The Hong Kong Polytechnic University Hung Hom, Kowloon, Hong Kong, SAR, China;Department of Computing, The Hong Kong Polytechnic University Hung Hom, Kowloon, Hong Kong, SAR, China;Department of Computing, The Hong Kong Polytechnic University Hung Hom, Kowloon, Hong Kong, SAR, China

  • Venue:
  • MASCOTS '05 Proceedings of the 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

The interaction between TCP and various Active Queue Management (AQM) algorithms has been extensively analyzed for the last few years. However, the analysis usually assumed that routers and TCP flows are not under any network attacks. In this paper, we investigate how the performance of TCP flows is affected by denial-of-service (DoS) attacks under the Drop Tail and various AQM schemes. In particular, we consider two types of DoS attacks the traditional flooding-based DoS (FDDoS) attacks and the recently proposed Pulsing DoS (PDoS) attacks. Both analytical and simulation results support that the PDoS attacks are more effective than the FDDoS attacks under the same average attack rate. Moreover, the Drop Tail surprisingly outperforms the RED-like AQMs when the router is under a PDoS attack, whereas the RED-like AQMs perform better under a severe FDDoS attack. On the other hand, the Adaptive Virtual Queue algorithm can retain a higher TCP throughput during PDoS attacks as compared with the RED-like AQMs.