Issue No. 05 - May (2013 vol. 62)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TC.2012.49
U. Ben-Porat , Comput. Eng. & Networks Lab. (TIK), ETH Zurich, Zurich, Switzerland
A. Bremler-Barr , Efi Arazi Sch. of Comput. Sci., Dept. of Comput. Sci., Interdiscipl. Center, Herzliya, Israel
H. Levy , Dept. of Comput. Sci., Tel-Aviv Univ., Tel-Aviv, Israel
In recent years, we have experienced a wave of DDoS attacks threatening the welfare of the internet. These are launched by malicious users whose only incentive is to degrade the performance of other, innocent, users. The traditional systems turn out to be quite vulnerable to these attacks. The objective of this work is to take a first step to close this fundamental gap, aiming at laying a foundation that can be used in future computer/network designs taking into account the malicious users. Our approach is based on proposing a metric that evaluates the vulnerability of a system. We then use our vulnerability metric to evaluate a data structure which is commonly used in network mechanisms-the Hash table data structure. We show that Closed Hash is much more vulnerable to DDoS attacks than Open Hash, even though the two systems are considered to be equivalent by traditional performance evaluation. We also apply the metric to queuing mechanisms common to computer and communications systems. Furthermore, we apply it to the practical case of a hash table whose requests are controlled by a queue, showing that even after the attack has ended, the regular users still suffer from performance degradation or even a total denial of service.
Internet, computer network security, cryptography, Distributed Denial of Service attacks, network mechanism vulnerability, DDoS attacks, Internet, computer-network designs, malicious users, vulnerability metric, hash table data structure, closed hash, open hash, queuing mechanisms, Computer crime, Measurement, Degradation, Complexity theory, Data structures, Servers, Bandwidth, metric, Computer crime, Measurement, Degradation, Complexity theory, Data structures, Servers, Bandwidth, malicious, DDoS, hash, queue, vulnerability
U. Ben-Porat, A. Bremler-Barr, H. Levy, "Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks", IEEE Transactions on Computers, vol. 62, no. , pp. 1031-1043, May 2013, doi:10.1109/TC.2012.49