Optimizing the pulsing denial-of-service attacks

Xiapu Luo, Kow Chuen Chang

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

22 Citations (Scopus)


In this paper we consider how to optimize a new generation of pulsing denial-of-service (PDoS) attacks from the attackers' points of views. The PDoS attacks are 'smarter' than the traditional attacks in several aspects. The most obvious one is that they require fewer attack packets to cause a similar damage. Another is that the PDoS attacks can be tuned to achieve different effects. This paper concentrates on the attack tuning part. In particular, we consider two conflicting goals involved in launching a PDoS attack: (1) maximizing the throughput degradation and (2) minimizing the risk of being detected. To address this problem, we first analyze the TCP throughput and quasi-global synchronization phenomenon caused by the PDoS attack. We then propose a family of objective functions to incorporate the two conflicting goals, and obtain the optimal attack settings. To validate the analytical results, we have carried out extensive experiments using both ns-2 simulation and a test-bed. The overall experimental results match well with the analytical results.
Original languageEnglish
Title of host publicationProceedings of the International Conference on Dependable Systems and Networks
Number of pages10
Publication statusPublished - 9 Nov 2005
Event2005 International Conference on Dependable Systems and Networks - Yokohama, Japan
Duration: 28 Jun 20051 Jul 2005


Conference2005 International Conference on Dependable Systems and Networks

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications


Dive into the research topics of 'Optimizing the pulsing denial-of-service attacks'. Together they form a unique fingerprint.

Cite this