2013 IEEE Symposium on Security and Privacy 2013
DOI: 10.1109/sp.2013.19
|View full text |Cite
|
Sign up to set email alerts
|

The Crossfire Attack

Abstract: We present the Crossfire attack -a powerful attack that degrades and often cuts off network connections to a variety of selected server targets (e.g., servers of an enterprise, a city, a state, or a small country) by flooding only a few network links. In Crossfire, a small set of bots directs lowintensity flows to a large number of publicly accessible servers. The concentration of these flows on the small set of carefully chosen links floods these links and effectively disconnects selected target servers from … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
38
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 108 publications
(38 citation statements)
references
References 52 publications
0
38
0
Order By: Relevance
“…It is easily guessed that the sufficient detection accuracy cannot be maintained if the sending interval is further lengthened. However, the attacker cannot unduly lengthen the sending interval because more than 30% of network topology is dynamically changed [1].…”
Section: Simulation Methodologymentioning
confidence: 99%
See 2 more Smart Citations
“…It is easily guessed that the sufficient detection accuracy cannot be maintained if the sending interval is further lengthened. However, the attacker cannot unduly lengthen the sending interval because more than 30% of network topology is dynamically changed [1].…”
Section: Simulation Methodologymentioning
confidence: 99%
“…We assume that each AS has only one router to simplify simulations. In accordance with [1], the number of bots and decoy servers is set to twice as many as the number of ASes. A bot sends traceroutes to all decoy servers three times at any given point in time.…”
Section: Simulation Setupmentioning
confidence: 99%
See 1 more Smart Citation
“…All servers in the target area will then be degraded or even cut off from network connectivity [1]. Furthermore, for the purpose of expanding the effectiveness of attacks and ensuring the indistinguishability of attack traffic from legitimate traffic, LFA dynamically attacks different target links during different periods, which is called a spatiotemporal series attack pattern [2]. For example, LFA attack some set of target links for a while and attack the other set of target links at another time-space.…”
Section: Introductionmentioning
confidence: 99%
“…As a new distributed denial of service (DDoS) attacks, low-rate distributed denial of service (L-DDoS) attacks mainly take advantage of some security vulnerabilities of the network protocol or adaptive mechanism to reduce network performance [2]. An intelligent attack-CrossFire is proposed in [3], this attack initiates link attacks at a low rate, and then generates aggregated traffic flow through multiple attack sources to achieve the purpose of blocking services in the data center. It can be known that L-DDoS not only could reduce the service performance of the data center, but also could cause a collapse in the network link.…”
Section: Introductionmentioning
confidence: 99%