Abstract

The increasing popularity of Internet of Things (IoTs) is making people universally connected and thus bringing the ease of life. Because of their sheer volume, weak security, and continual operation, IoT devices, along with many computer servers, are widely compromised to launch powerful distributed denial-of-service (DDoS) attacks. The emerging link flooding attacks (LFAs) are one type of such attacks that attract significant attention in both academia and industry against the routing infrastructure. The attack traffic flows originating from bots (e.g., compromised IoT devices) are deliberately aggregated at upstream critical links and grow intensified, gradually making a network connected to the critical links disconnected. Although LFAs are far more sophisticated than traditional DDoS attacks, whether such sophistication comes without a downside has never been investigated. In this paper, by modeling link flooding attacks and defenses, we tackle a series of questions concerning the practical issues of LFAs. Specifically, from the perspective of attacks, we advance a novel notion of strike precision, and reveal that LFAs may exhibit attack interference (i.e., unexpectedly interfere the connectivity of innocent networks) which might undermine the stealthiness and persistence of LFAs. From the perspective of defenses, we make the first step to study attack intention, i.e., inversely inferring the target network to disconnect based on the identified links under attack. Furthermore, we consider a strong defender who employs traffic engineering to mitigate LFAs, and formulate the game-theoretic interactions between attackers and defenders. Our formulation demonstrates that LFAs can be effectively mitigated based on traffic engineering from a game-theoretic perspective. We also study practical issues of non-cooperative defenses (e.g., light-weight probe deployment, multi-protocol-based measurement).

Highlights

  • The increasing popularity of Internet of Things (IoTs) is making people universally connected and bringing the ease of life

  • Our formulation demonstrates that link flooding attacks (LFAs) can be effectively mitigated based on traffic engineering from a game-theoretic perspective

  • We take the first step to take into account these issues, and model LFAs from both the attack and defense perspectives

Read more

Summary

INTRODUCTION

The increasing popularity of Internet of Things (IoTs) is making people universally connected and bringing the ease of life. The disconnected network, though having traditional DDoS countermeasures deployed at the network perimeter, might be blind to the attack, since the critical link is not within its administrative domain. By modeling link flooding attacks and defenses, we tackle a series of questions concerning the practical issues of LFAs. we advance the notion of strike precision of LFAs, and reveal that LFAs may exhibit attack interference which might restrict their applicability from the adversary’s standpoint. RQ1: To what extent does attack interference exist, and how do they affect strike precision, in traditional LFAs that only seeks strike efficiency, i.e., interrupting more routes (destined to N ) by flooding fewer selected links?. Following the SEO flooding strategy, we perform traditional LFAs to gain insight into their strike precision.

LINK FLOODING ATTACK
ATTACK INTERFERENCE
MODELING LINK FLOODING DEFENSES
ATTACK INTENTION
A GAME-THEORETIC FORMULATION OF LINK
PRACTICAL ISSUES OF NON-COOPERATIVE DEFENSES
EFFECTIVE TOPOLOGY PROBING
MEASURING STRIKE PRECISION UNDER DIFFERENT STRATEGIES
MEASURING STRIKE EFFICIENCY UNDER DIFFERENT STRATEGIES
VIII. DISCUSSION
RELATED WORK
Findings
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call