Article

Article title MODELING AND STUDY OF LOW-INTENSITY DOS-ATTACKS ON BGP-INFRASTRUCTURE
Authors Y.V. Tarasov, O.B. Makarevich
Section SECTION II. SECURITY OF INFORMATION SYSTEMS AND NETWORKS
Month, Year 12, 2013 @en
Index UDC 004.056
DOI
Abstract The results of the analysis and simulation study of attacks such as " denial of service " for a variety of services that store, process and transmit data to the Internet. Focuses on the simulation of low-intensity DoS-attacks on the infrastructure of the global dynamic routing protocol BGP (Border Gateway Protocol). As the software was chosen apache2, nginx, quagga, debian, vmware and citrix xenserver using the most popular configuration options . In some cases, specially modified configuration parameters to reduce the security services, which would get pre- expected results for comparison. The study analyzed the vulnerability of data communication protocols of the transport and application layer , leading to the possibility of the threat of low-intensity DoS-attacks . This study should demonstrate how to implement this type of attack on the real computer systems and computer networks . The result of the study is to assess the criticality of low-intensity attacks such as denial of service on the infrastructure of BGP.

Download PDF

Keywords Low-rate DoS-attacks; Border Gateway Protocol; attack modeling; security of computer networks.
References 1. Решение Cisco Systems «Clean Pipes» по защите от распределенных DOS-атак для операторов связи и их клиентов [Электронный ресурс]. – Режим доступа:
http://www.cisco.com/ web/RU/downloads/CleanPipes_rus.pdf, свободный (дата обращения: 01.08.2013).
2. Абрамов Е.С., Сидоров И.Д. Метод обнаружения распределенных информационных воздействий на основе гибридной нейронной сети // Известия ЮФУ. Технические науки. – 2009. – № 11 (100). – С. 154-164.
3. Лобанов В.Е., Оныкий Б.Н., Станкевичус А.А. Архитектура системы защиты Грид от атак типа «отказ в обслуживании» и «распределенный отказ в обслуживании» // Безопасность информационных технологий. – 2010. – № 3. – С. 136-139.
4. Обзор DDoS-атак во втором квартале 2011 года. – [Электронный ресурс]. – Режим доступа: http://www.securelist.com/ru/analysis/208050712/ Obzor_DDoS_atak_vo_vtorom_kvartale_ 2011_goda (дата обращения: 01.08.2013).
5. Chee W.O. Brennan T. OWASP AppSec DC 2010. HTTP POST DDoS. – [Электронный ресурс]. – Режим доступа: https://www.owasp.org/images/4/43/ Layer_7_DDOS.pdf (дата
обращения: 01.08.2013).
6. Abramov E.S., Andreev A.V., Mordvin D.V., Makarevich O.B. Corporate networks security evaluation based on attack graphs // Proceedings of the 4th international conference on Security of information and networks (SIN '11)-ACM, New York, NY, USA, 2011. – P. 29-36.
7. Aleksandar Kuzmanovic, Edward W. Knightly. Low-rate TCP-targeted denial of service attacks and counter strategies // IEEE/ACM Trans. Netw. – 2006. – № 14 (4). – С. 683-696.
8. Paxson V., Allman M., Chu H.K., and Sargent M. Computing TCP's Retransmission Timer, RFC 6298, Proposed Standard, June 2011.

Comments are closed.