2017 IEEE 25th International Conference on Network Protocols (ICNP) 2017
DOI: 10.1109/icnp.2017.8117547
|View full text |Cite
|
Sign up to set email alerts
|

Multipath TCP traffic diversion attacks and countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 16 publications
0
10
0
Order By: Relevance
“…Nguyen et al [42] investigated the Autonomous System (AS)-level Man-in-the-Middle (MITM) attacks acting at the robustness of MPTCP communications, reported which countries and regions had a high-level of robustness against the MITM attacks by studying the AS level graph, and provided a countermeasure in preventing MPTCP from the AS-level MITM attacks when concurrently using multiple Internet-scale paths for multipath communications. Munir et al [43] first reported the potential security vulnerabilities in MPTCP due to crosspath interactions among MPTCP subflows, caused by two typical attacks: connection hijack attacks and directed traffic diversion attacks, and then proposed the corresponding countermeasure proposal to guarantee MPTCP to be no less secure than TCP under the two typical attacks.…”
Section: F Mptcp Security Casesmentioning
confidence: 99%
“…Nguyen et al [42] investigated the Autonomous System (AS)-level Man-in-the-Middle (MITM) attacks acting at the robustness of MPTCP communications, reported which countries and regions had a high-level of robustness against the MITM attacks by studying the AS level graph, and provided a countermeasure in preventing MPTCP from the AS-level MITM attacks when concurrently using multiple Internet-scale paths for multipath communications. Munir et al [43] first reported the potential security vulnerabilities in MPTCP due to crosspath interactions among MPTCP subflows, caused by two typical attacks: connection hijack attacks and directed traffic diversion attacks, and then proposed the corresponding countermeasure proposal to guarantee MPTCP to be no less secure than TCP under the two typical attacks.…”
Section: F Mptcp Security Casesmentioning
confidence: 99%
“…Use of mutipath routing for secure and reliable transmission of data has been extensively studied in the context of wireless sensor networks and multipath TCP (MPTCP) routing Munir et al 2017;Shafiq et al 2013). Multipath routing has been used for improving packet delivery ratios by distributing load more efficiently (Wang et al 2001;Ganjali and Keshavarzian 2004;Bhattacharya et al 2018;Pearlman et al 2000), improving energy usage efficiency (Ben-Othman and Yahya 2010; Velásquez-Villada and Donoso 2013), and dealing adaptively with congestion (Tran and Raghavendra 2005).…”
Section: Secure Multipath Routing Related Workmentioning
confidence: 99%
“…Munir et al [16] presented a study to defend an attack using the two cross-path MPTCP vulnerability. It uses a method of dividing secret information to solve the vulnerability.…”
Section: B Non-encryption-based Schemesmentioning
confidence: 99%
“…This shows not much difference from exchanging keys in non-encrypted environment. The scheme of [16] exchanges additional secret information, nonce, for every subflow establishment, and generates HMAC with keys of hosts and nonces. It is only secure against attack models occupying a subflow, because the attacker located in several, or all subflows is capable of obtaining multiple exchanged nonces.…”
Section: B Non-encryption-based Schemesmentioning
confidence: 99%
See 1 more Smart Citation