题名 | Unleashing the shrew: a stealth greedy targeted attack on TCP traffic in wireless LANs |
作者 | |
DOI | |
发表日期 | 2014-09
|
会议名称 | 39th Annual IEEE Conference on Local Computer Networks
|
ISSN | 0742-1303
|
页码 | 337-344
|
会议日期 | 2014.9.8-2014.9.11
|
会议地点 | Edmonton, Canada
|
会议录编者/会议主办者 | IEEE
|
摘要 | This paper presents a new jamming attack in wireless LANs that deliberately targets uplink TCP acknowledgements (TCP-ACKs) of downlink TCP flows. To ensure immunity to detection with existing schemes, in this attack, the attacker does not jam the target constantly; instead, it relies on our probabilistic estimation model to forecast the time when its transmission has the highest likelihood of colliding with the target's generated TCP-ACKs. Repeating this process results in a decrease of the average congestion window of the targeted due to an increased round-trip time (RTT). The rogue node and/or its colluding attackers can grab this freed bandwidth and increase their throughput. We demonstrate via ns-2 simulation the effectiveness of such attack and show how easy it is to deploy without hardware modification. We also discuss its immunity to detection by existing detection schemes and investigate some parameters that may be used in building future detection mechanisms. |
关键词 | |
学校署名 | 其他
|
语种 | 英语
|
学科门类 | 工学::计算机科学与技术(可授工学、理学学位)
|
引用统计 |
被引频次[WOS]:0
|
成果类型 | 会议论文 |
条目标识符 | http://sustech.caswiz.com/handle/2SGJ60CL/124987 |
专题 | 商学院_信息系统与管理工程系 |
作者单位 | 1.The Hong Kong University of Science and Technology 2.Telecom ParisTech |
推荐引用方式 GB/T 7714 |
Gu, Liyi,Zhang, Jun,Bensaou, Brahim. Unleashing the shrew: a stealth greedy targeted attack on TCP traffic in wireless LANs[C]//IEEE,2014:337-344.
|
条目包含的文件 | ||||||
文件名称/大小 | 文献类型 | 版本类型 | 开放类型 | 使用许可 | 操作 | |
06925789.pdf(665KB) | -- | -- | 限制开放 | -- |
|
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论