2021
DOI: 10.1109/tdsc.2019.2948167
|View full text |Cite
|
Sign up to set email alerts
|

Low-High Burst: A Double Potency Varying-RTT Based Full-Buffer Shrew Attack Model

Abstract: The full-buffer Shrew (FB-Shrew) denial of service (DoS) attack is a variant of the classic Shrew attack that exploits the congestion control mechanism of transmission control protocol (TCP). Here, an attacker sends a high-rate burst of attack packets only after the router buffer is filled with TCP packets, causing the router to drop legitimate packets, and forcing the retransmission of TCP packets. As such, an FB-Shrew attack can cause maximum damage with minimum resources. In this paper, we challenge an assu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

1
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 45 publications
1
2
0
Order By: Relevance
“…During this period, the window is in the steady phase. As cwnd is not less than cwnd tcp , the window follows the cubic function increment from 39 to 50, which agrees with the theoretical value calculated by (15). In addition, Fig.…”
Section: A Verification Of Attack Modelssupporting
confidence: 88%
See 1 more Smart Citation
“…During this period, the window is in the steady phase. As cwnd is not less than cwnd tcp , the window follows the cubic function increment from 39 to 50, which agrees with the theoretical value calculated by (15). In addition, Fig.…”
Section: A Verification Of Attack Modelssupporting
confidence: 88%
“…2)As the RED algorithm does not make the router buffer full, the traditional full-buffer LDoS attack is no longer applicable [15].…”
Section: Introductionmentioning
confidence: 99%
“…This attack was first idealized by Guirguis et al in [37] and subsequently improved by Yue et al in [38] and [39]. The aim is to send high-rate traffic bursts only after the queue router buffer is full.…”
Section: ) Full-buffer Shrew Attackmentioning
confidence: 99%