Evaluation of a low-rate DoS attack against iterative servers

  • Authors:
  • Gabriel Maciá-Fernández;Jesús E. Díaz-Verdejo;Pedro García-Teodoro

  • Affiliations:
  • Department of Signal Theory, Telematics and Communications E.T.S. Computer Science, University of Granada, c/Daniel Saucedo Aranda, s/n, 18071 Granada, Spain;Department of Signal Theory, Telematics and Communications E.T.S. Computer Science, University of Granada, c/Daniel Saucedo Aranda, s/n, 18071 Granada, Spain;Department of Signal Theory, Telematics and Communications E.T.S. Computer Science, University of Granada, c/Daniel Saucedo Aranda, s/n, 18071 Granada, Spain

  • Venue:
  • Computer Networks: The International Journal of Computer and Telecommunications Networking
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents a low-rate DoS attack that could be launched against iterative servers. Such an attack takes advantage of the vulnerability consisting in the possibility of forecasting the instant at which an iterative server will generate a response to a client request. This knowledge could allow a potential intruder to overflow application buffers with relatively low-rate traffic to the server, thus avoiding the usual DoS IDS detection techniques. Besides the fundamentals of the attack, the authors also introduce a mathematical model for evaluating the efficiency of this kind of attack. The evaluation is contrasted with both simulated and real implementations. Some variants of the attack are also studied. The overall results derived from this work show how the proposed low-rate DoS attack could cause an important negative impact on the performance of iterative servers.