Defense against low-rate TCP-targeted denial-of-service attacks

  • Authors:
  • Guang Yang;M. Gerla;M. Y. Sanadidi

  • Affiliations:
  • Dept. of Comput. Sci., California Univ., Los Angeles, CA, USA;Dept. of Comput. Sci., California Univ., Los Angeles, CA, USA;Dept. of Comput. Sci., California Univ., Los Angeles, CA, USA

  • Venue:
  • ISCC '04 Proceedings of the Ninth International Symposium on Computers and Communications 2004 Volume 2 (ISCC"04) - Volume 02
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Low-rate TCP-targeted denial-of-service (DoS) attacks aim at the fact that most operating systems in use today have a common base TCP retransmission timeout (RTO) of 1 sec. An attacker injects periodic bursts of packets to fill the bottleneck queue and forces TCP connections to timeout with near-zero throughput. This work proposes randomization on TCP RTO as defense against such attacks. With RTO randomization, an attacker cannot predict the next TCP timeout and consequently cannot inject the burst at the exact instant. An analytic performance model on the throughput of randomized TCP is developed and validated. Simulation results show that randomization can effectively mitigate the impact of such DoS attacks while maintaining fairness and friendliness to other connections.