DocumentCode
612033
Title
The Crossfire Attack
Author
Min Suk Kang ; Soo Bum Lee ; Gligor, Virgil D.
fYear
2013
fDate
19-22 May 2013
Firstpage
127
Lastpage
141
Abstract
We present the Crossfire attack -- a powerful attack that degrades and often cuts off network connections to a variety of selected server targets (e.g., servers of an enterprise, a city, a state, or a small country) by flooding only a few network links. In Crossfire, a small set of bots directs low intensity flows to a large number of publicly accessible servers. The concentration of these flows on the small set of carefully chosen links floods these links and effectively disconnects selected target servers from the Internet. The sources of the Crossfire attack are undetectable by any targeted servers, since they no longer receive any messages, and by network routers, since they receive only low-intensity, individual flows that are indistinguishable from legitimate flows. The attack persistence can be extended virtually indefinitely by changing the set of bots, publicly accessible servers, and target links while maintaining the same disconnection targets. We demonstrate the attack feasibility using Internet experiments, show its effects on a variety of chosen targets (e.g., servers of universities, US states, East and West Coasts of the US), and explore several countermeasures.
Keywords
computer network security; telecommunication links; telecommunication network routing; bot connection; crossfire attack persistence; disconnection target links; legitimate flows; network connections; network link floods; network routers; publicly accessible servers; target servers; Bandwidth; Educational institutions; IP networks; Internet; Measurement; Protocols; Servers;
fLanguage
English
Publisher
ieee
Conference_Titel
Security and Privacy (SP), 2013 IEEE Symposium on
Conference_Location
Berkeley, CA
ISSN
1081-6011
Print_ISBN
978-1-4673-6166-8
Electronic_ISBN
1081-6011
Type
conf
DOI
10.1109/SP.2013.19
Filename
6547106
Link To Document