Portcullis: protecting connection setup from denial-of-capability attacks

  • Authors:
  • Bryan Parno;Dan Wendlandt;Elaine Shi;Adrian Perrig;Bruce Maggs;Yih-Chun Hu

  • Affiliations:
  • Carnegie Mellon University, Pittsburgh, PA;Carnegie Mellon University, Pittsburgh, PA;Carnegie Mellon University, Pittsburgh, PA;Carnegie Mellon University, Pittsburgh, PA;Carnegie Mellon University & Akamai Technologies, Pittsburgh, PA;University of Illinois at Urbana-Champaign, Urbana, IL

  • Venue:
  • Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Systems using capabilities to provide preferential service to selected flows have been proposed as a defense against large-scale network denial-of-service attacks. While these systems offer strong protection for established network flows, the Denial-of-Capability (DoC) attack, which prevents new capability-setup packets from reaching the destination, limits the value of these systems. Portcullis mitigates DoC attacks by allocating scarce link bandwidth for connection establishment packets based on per-computation fairness. We prove that a legitimate sender can establish a capability with high probability regardless of an attacker's resources or strategy and that no system can improve on our guarantee. We simulate full and partial deployments of Portcullis on an Internet-scale topology to confirm our theoretical results and demonstrate the substantial benefits of using per-computation fairness.