On the resistance of overlay networks against bandwidth exhaustion attacks

نویسندگان

  • Franz Girlich
  • Michael Roßberg
  • Günter Schäfer
چکیده

In order to perform private communication over public networks, such as the Internet, several different kinds of virtual overlay networks emerged. Examples are the well known Virtual Private Networks (VPN), Darknets, and anonymizing networks like Tor. All of these networks are designed to provide data delivery that is confidential, authentic and integrity protected. Nonetheless, for a secure operation also the availability must be taken into account, especially as these structures turn into vital targets for Denial-of-Service (DoS) attacks. Within this article we present metrics to rate different network topologies with regard to their resistance against botnets, whose available attack bandwidth is not a limiting factor. The presented metrics consider random, greedy, and optimally operating attackers, and are used to derive several properties that very resilient overlay topologies must have. In particular high girth and a low constant node degree were identified and validated by simulations. Franz Girlich Ilmenau University of Technology Tel.: +49-3677-694157 Fax: +49-3677-694540 E-mail: [email protected] Michael Rossberg Ilmenau University of Technology E-mail: [email protected] Guenter Schaefer Ilmenau University of Technology E-mail: [email protected]

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Robust Overlay Networks: Enhancing Adaptivity Mechanisms with Byzantine-Resilience

Adaptive measurement-based overlay networks offer increased performance and resilience to benign failures for end-to-end communication by using aggressive adaptivity mechanisms. These mechanisms dynamically optimize applicationcentric metrics such as latency, jitter, bandwidth, and loss rate. However, end-systems are more vulnerable than core routers, making overlay networks susceptible to mali...

متن کامل

Tolerating Denial-of-Service Attacks Using Overlay Networks - Impact of Overlay Network Topology

Proxy-network based overlays have been proposed to protect Internet Applications against Denial-of-Service (DoS) attacks by hiding an application’s location. We study how a proxy network’s topology influences the effectiveness of location-hiding. We provide a general analysis of system dynamics under attack, and study how the speed of attack, speed of defense, and proxy network topology affect ...

متن کامل

Towards Scalable and Robust Overlay Networks

Every peer-to-peer system is based on some overlay network connecting its peers. Many of the overlay network concepts proposed in the scientific community are based on the concept of virtual space. These designs are usually highly scalable, but they do not guarantee robustness against adversarial attacks, especially when considering open peer-to-peer systems. In these systems, determined advers...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

Pushback for Overlay Networks: Protecting Against Malicious Insiders

Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be rendered inoperable by simple flooding attacks generated from insider nodes. In this paper, we study detection and containment mechanisms against insider Denial of Service (DoS) attacks for overlay networks. To counter such ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Telecommunication Systems

دوره 60  شماره 

صفحات  -

تاریخ انتشار 2015