Best effort applications over non-TCP protocols, e.g., UDP, can be used in attacks that capture unfairly large share of bandwidth compared to TCP flows. While earlier studies may have pointed out that short-lived TCP flows (mice) may hurt long-lived TCP flows (elephants) in the long term, no insight was given as to developing scenarios leading to drastic decrease in throughputs of long-lived TCP flows. We have systematically developed TCP attack scenarios that differ from all prior research in that we use short-lived TCP flows to attack long-lived TCP flows. Our attacks are interesting since, (a) they are more difficult to detect, and (b) they point out the increased vulnerabilities of recently proposed scheduling, AQM and routing technique...
In recent years a number of TCP variants have emerged to optimise some aspect of data transport wher...
Among various types of denial of service attacks, “dropping attack ” is probably the most difficult ...
In this paper, we expose an unorthodox adversarial attack that exploits the transients of a system's...
Abstract — While earlier studies have pointed out that short-lived TCP flows (mice) may hurt long-li...
Denial of Service attacks are presenting an increasing threat to the global inter-networking infrast...
Recent research have exposed new breeds of attacks that are capable of denying service or inflicting...
Denial of Service attacks are presenting an increasing threat to the global inter-networking infrast...
Abstract — Short TCP flows may suffer significant response-time performance degradations during netw...
xviii, 219 p. : ill. ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P COMP 2007 LuoThis thesis pres...
Restricted until 28 Apr. 2010.Many modern variations of transport protocols are equipped with improv...
In this paper we analyze a new class of pulsing denial-of-service (PDoS) attacks that could seriousl...
Abstract: In this paper, we propose a new mechanism to combat pulsing Denial-of-Service (DoS) at-tac...
Abstract—In this paper, we investigate the applicability of simulation and emulation for denial of s...
The traditional concept of fairness in TCP is based on being limited by congestion control. Today, h...
A few low-rate, TCP-targeted denial-of-service (DoS) attacks have been recently proposed, including ...
In recent years a number of TCP variants have emerged to optimise some aspect of data transport wher...
Among various types of denial of service attacks, “dropping attack ” is probably the most difficult ...
In this paper, we expose an unorthodox adversarial attack that exploits the transients of a system's...
Abstract — While earlier studies have pointed out that short-lived TCP flows (mice) may hurt long-li...
Denial of Service attacks are presenting an increasing threat to the global inter-networking infrast...
Recent research have exposed new breeds of attacks that are capable of denying service or inflicting...
Denial of Service attacks are presenting an increasing threat to the global inter-networking infrast...
Abstract — Short TCP flows may suffer significant response-time performance degradations during netw...
xviii, 219 p. : ill. ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P COMP 2007 LuoThis thesis pres...
Restricted until 28 Apr. 2010.Many modern variations of transport protocols are equipped with improv...
In this paper we analyze a new class of pulsing denial-of-service (PDoS) attacks that could seriousl...
Abstract: In this paper, we propose a new mechanism to combat pulsing Denial-of-Service (DoS) at-tac...
Abstract—In this paper, we investigate the applicability of simulation and emulation for denial of s...
The traditional concept of fairness in TCP is based on being limited by congestion control. Today, h...
A few low-rate, TCP-targeted denial-of-service (DoS) attacks have been recently proposed, including ...
In recent years a number of TCP variants have emerged to optimise some aspect of data transport wher...
Among various types of denial of service attacks, “dropping attack ” is probably the most difficult ...
In this paper, we expose an unorthodox adversarial attack that exploits the transients of a system's...