作者: M. Guirguis , A. Bestavros , I. Matta
DOI: 10.1109/ICNP.2004.1348109
关键词: Denial-of-service attack 、 Network element 、 Computer network 、 Computer science 、 Service quality 、 Adaptive behavior 、 Exploit 、 The Internet 、 Adaptation (computer science) 、 Quality of service 、 Computer security
摘要: We expose an unorthodox adversarial attack that exploits the transients of a system's adaptive behavior, as opposed to its limited steady-state capacity. show well orchestrated could introduce significant inefficiencies potentially deprive network element from much capacity, or significantly reduce service quality, while evading detection by consuming unsuspicious, small fraction element's hijacked This type stands in sharp contrast traditional brute-force, sustained high-rate DoS attacks, recently proposed attacks exploit specific protocol settings such TCP timeouts. exemplify what we term reduction quality (RoQ) exposing vulnerabilities common adaptation mechanisms. develop control-theoretic models and associated metrics quantify these vulnerabilities. present numerical simulation results, which validate with observations real Internet experiments. Our findings motivate need for development mechanisms are resilient new forms attacks.