Fundamental Scaling Laws of Covert DDoS Attacks - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu
Article Dans Une Revue Performance Evaluation Année : 2021

Fundamental Scaling Laws of Covert DDoS Attacks

Résumé

Botnets such as Mirai use insecure home devices to conduct distributed denial of service attacks on the Internet infrastructure. Although some of those attacks involve large amounts of traffic, they are generated from a large number of homes, which hampers their early detection. In this paper, our goal is to answer the following question: what is the maximum amount of damage that a DDoS attacker can produce at the network edge without being detected? To that aim, we consider a statistical hypothesis testing approach for attack detection at the network edge. The proposed system assesses the goodness of fit of traffic models based on the ratio of their likelihoods. Under such a model, we show that the amount of traffic that can be generated by a covert attacker scales according to the square root of the number of compromised homes. We evaluate and validate the theoretical results using real data collected from thousands of home-routers connected to a mid-sized ISP.
Fichier principal
Vignette du fichier
Covert_DDoS_Attack.pdf (811.53 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-03372124 , version 1 (09-10-2021)

Identifiants

Citer

Reza Amir, Philippe Nain, Daniel Sadoc Menasche, Don Towsley, Edmundo de Souza. Fundamental Scaling Laws of Covert DDoS Attacks. Performance Evaluation, 2021, 151, ⟨10.1016/j.peva.2021.102236⟩. ⟨hal-03372124⟩
33 Consultations
156 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More