TY - GEN
T1 - Shoot at a pigeon and kill a crow
T2 - 12th International Conference on Network and System Security, NSS 2018
AU - Peng, Jiahao
AU - Ma, Xiaobo
AU - Li, Jianfeng
AU - Xue, Lei
AU - Hu, Wenjun
PY - 2018/8
Y1 - 2018/8
N2 - The emerging link flooding attacks (LFAs) increasingly attract significant attention in both academia and industry, due to their huge threat to the routing infrastructure. Compared with traditional distributed denial-of-service attacks (DDoS) that target servers, LFAs target critical links. Stemming from coordinated flows between bots and public servers or among bots, the attack traffic flows are aggregated at a critical link, thereby gradually making a network connected to the critical link disconnected as the aggregated attack traffic flows grow intensified. It is commonly believed that LFAs are far more sophisticated than traditional DDoS attacks. Nevertheless, whether such sophistication comes without a downside has never been investigated. In this paper, we advance the notion of strike precision of LFAs, and reveal that LFAs may exhibit attack interference which might restrict their applicability from the adversary’s standpoint. Due to attack interference, strike precision of LFAs would be lowered. That is, while disconnecting a network, LFAs may unexpectedly interfere the connectivity of innocent networks nearby, undermining the stealthiness and persistence of LFAs. We tackle a series of questions surrounding strike precision, for fostering more research concerning the practical aspects of LFAs.
AB - The emerging link flooding attacks (LFAs) increasingly attract significant attention in both academia and industry, due to their huge threat to the routing infrastructure. Compared with traditional distributed denial-of-service attacks (DDoS) that target servers, LFAs target critical links. Stemming from coordinated flows between bots and public servers or among bots, the attack traffic flows are aggregated at a critical link, thereby gradually making a network connected to the critical link disconnected as the aggregated attack traffic flows grow intensified. It is commonly believed that LFAs are far more sophisticated than traditional DDoS attacks. Nevertheless, whether such sophistication comes without a downside has never been investigated. In this paper, we advance the notion of strike precision of LFAs, and reveal that LFAs may exhibit attack interference which might restrict their applicability from the adversary’s standpoint. Due to attack interference, strike precision of LFAs would be lowered. That is, while disconnecting a network, LFAs may unexpectedly interfere the connectivity of innocent networks nearby, undermining the stealthiness and persistence of LFAs. We tackle a series of questions surrounding strike precision, for fostering more research concerning the practical aspects of LFAs.
KW - Crossfire
KW - Link flooding attack
KW - Strike precision
UR - http://www.scopus.com/inward/record.url?scp=85058983851&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-02744-5_32
DO - 10.1007/978-3-030-02744-5_32
M3 - Conference article published in proceeding or book
AN - SCOPUS:85058983851
SN - 9783030027438
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 436
EP - 451
BT - Network and System Security - 12th International Conference, NSS 2018, Proceedings
A2 - Au, Man Ho
A2 - Luo, Xiapu
A2 - Li, Jin
A2 - Kluczniak, Kamil
A2 - Yiu, Siu Ming
A2 - Wang, Cong
A2 - Castiglione, Aniello
PB - Springer Verlag
Y2 - 27 August 2018 through 29 August 2018
ER -