The new threat to internet: DNP attack with the attacking flows strategizing technology

Distributed network paralyzing DNP attack, a kind of distributed denial-of-service attack that utilize botnet to congest and paralyze autonomous system level network, is a serious threat to network security. In this article, it is indicated that the most difficulty of DNP attack is strategizing DNP attacking flows automatically from the perspective of the attacker. For this outstanding issue, we introduce the DNP attacking flows strategizing technology, which can help an attacker to launch DNP attack efficiently through a series of attacking resources division-target links and attacking paths orientation-flux planning process. Through simulation, we demonstrate that the feasibility of attacking flows strategizing technology and prove that an attacker who controls a large-scale botnet can utilize DNP attack to seriously threat the network security. At last, from the perspective of the defender, it is indicated that the network security researcher should strengthen the relevant research to defend the DNP attack. Copyright © 2014 John Wiley & Sons, Ltd.

[1]  Sha Hu,et al.  Technology classification, industry, and education for Future Internet of Things , 2012, Int. J. Commun. Syst..

[2]  George Kesidis,et al.  Game Theoretic Iterative Partitioning for Dynamic Load Balancing in Distributed Network Simulation , 2011, ArXiv.

[3]  Jia Wang,et al.  A measurement study of Internet bottlenecks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[4]  Ying Zhang,et al.  Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing , 2007, NDSS.

[5]  Aziz Mohaisen,et al.  Losing control of the internet: using the data plane to attack the control plane , 2010, CCS '10.

[6]  D. Richard Kuhn,et al.  Study of BGP Peering Session Attacks and Their Impacts on Routing Performance , 2006, IEEE Journal on Selected Areas in Communications.

[7]  Danny Dolev,et al.  Internet resiliency to attacks and failures under BGP policy routing , 2006, Comput. Networks.

[8]  Yu Wang,et al.  A cascading failure model for interdomain routing system , 2012, Int. J. Commun. Syst..

[9]  Adrian Perrig,et al.  The Coremelt Attack , 2009, ESORICS.

[10]  Shi Zhou,et al.  Accurately modeling the Internet topology , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[11]  Yakov Rekhter,et al.  A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.

[12]  Lixin Gao,et al.  A measurement study on the impact of routing events on end-to-end internet path performance , 2006, SIGCOMM.

[13]  Jonathan Loo,et al.  6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..

[14]  Christopher Krügel,et al.  Are BGP Routers Open to Attack? An Experiment , 2010, iNetSec.

[15]  Peter Steenkiste,et al.  Evaluation and characterization of available bandwidth probing techniques , 2003, IEEE J. Sel. Areas Commun..

[16]  Hyunsoo Yoon,et al.  Congestion control for sudden bandwidth changes in TCP , 2012, Int. J. Commun. Syst..

[17]  Yongdae Kim,et al.  Taking Routers Off Their Meds : Unstable Routers and the Buggy BGP Implementations That Cause Them , 2011 .

[18]  Ping Wang,et al.  An Advanced Hybrid Peer-to-Peer Botnet , 2007, IEEE Transactions on Dependable and Secure Computing.

[19]  Eunmi Choi,et al.  A service-oriented taxonomical spectrum, cloudy challenges and opportunities of cloud computing , 2012, Int. J. Commun. Syst..