Malicious Packet Dropping: How It Might Impact the TCP Performance and How We Can Detect It
نویسندگان
چکیده
Among various types of denial of service attacks, “dropping attack” is probably the most difficult one to handle. This paper explores the negative impacts of packet dropping attacks and a method to detect such attacks. First, three dropping patterns are classified and investigated. We demonstrate that attackers can choose different dropping patterns to degrade TCP service to different levels, and selectively dropping a very small number of packets can result in a severe damage to TCP performance. Second, we show that a hacker can utilize a DDoS attack tool to control a “uncompromised” router to emulate dropping attacks. This proves that dropping attacks are indeed practically very possible to happen in today’s Internet environment. Third, we present a statistic analysis module for the detection of TCP packet dropping attacks. Three measures, session delay, the position and the number of packet reordering, have been implemented in the statistic module. This paper has evaluated and compared their detection performance.
منابع مشابه
IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملImproving Bandwidth-power Efficiency of Homogeneous Wireless Networks Using On-meet Threshold Strategy (RESEARCH NOTE)
Over two decades, a problem of location dependent has been focused for improving the communication Bandwidth-Power Efficiency of homogeneous networks. The efficiencies of communication links are weakened by the Hidden Terminal Problem. Thus we propose a Fine – Tune Strategy for analyzing the On-Off communication region. We were observed that the proposed technique had been able to track and mo...
متن کاملDetecting Malicious Dropping Attack in the Internet
The current interdomain routing protocol, Border Gateway Protocol, is limited in implementations of universal security. Because of this, it is vulnerable to many attacks at the AS to AS routing infrastructure. Initially, the major concern about BGP security is that malicious BGP routers can arbitrarily falsify BGP routing messages and spread incorrect routing information. Recently, some authors...
متن کاملScattered Dropping Attack on TCP-Based Mobile Ad-Hoc Networks
Scattered Dropping Attack (SDA) is a simple yet very powerful denial of service (DoS) attack that is effective on both TCP and UDP based MANETs. The simulation results clearly show the impact of proposed attack on the network throughput, bandwidth wastage and received data quality. It has also been observed that even though the TCP congestion control is adaptable to the packet losses but in cas...
متن کاملPrevention and Detection of Packet Dropping and Message Tampering Attack on MANET using EAMD
A packet dropping and message tampering attack contains data which routed between source and destination. Packet dropping attack happens accidently or deliberately on network or packet switching network. Message tampering attack causes measure problem in message transmission activity, due to unauthorized party tampered message and can change message contains so it hard to detect that tampered m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000