A Genealogical Approach to Analyzing Post-Mortem Denial of Service Attacks

dc.contributor.author Rice, Greg
dc.contributor.author Davis, James
dc.contributor.department Electrical and Computer Engineering
dc.date 2018-02-15T09:08:48.000
dc.date.accessioned 2020-06-30T02:01:29Z
dc.date.available 2020-06-30T02:01:29Z
dc.date.embargo 2014-11-10
dc.date.issued 2002-09-01
dc.description.abstract <p>Availability requires that computer systems remain functioning as expected without loss of resources to legitimate users. The impact of a lack of availability to services and data is often little more than a nuisance; however the results could be devastating if critical computational and communication resources are targeted. One of the most problematic challenges to availability is the denial of service (DoS) attack. Over time, DoS attacks have become increasingly sophisticated, often employing techniques like address spoofing, coordinated distributed sources of attack, and subverting “inside” computers to assist in carrying out the attack. DoS attacks are very easy to launch, are effective, and are difficult to prevent or mitigate.</p> <p>The purpose of this work is to study post-mortem DoS attacks over time with the goals of uncovering how the attacks relate to each other, identifying the underlying vulnerability that led to success, and gaining insight on future attack trends. By studying how attacks have changed over time and adapted to overcome new security practices, it is possible to construct attack trees to represent the genealogy and history of DoS attack tools. Through code inspections and close analysis of the attack trees, we were able to identify core techniques copied from one attack to another, the synthesis of more effective techniques based on combinations of existing methods, and the genesis of novel attack strategies. The generation of attack trees allows for an important examination of how attacks relate to one another as well as insight on the core vulnerabilities that still remain in modern software solutions. More importantly, by closely analyzing the genealogy of attack trees and post-mortem DoS exploitation, we not only gain information on the methodologies currently used by attackers but also discover valuable insight on predicting future attack patterns as well as developing possible countermeasure.</p>
dc.identifier archive/lib.dr.iastate.edu/ece_conf/3/
dc.identifier.articleid 1002
dc.identifier.contextkey 6344342
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath ece_conf/3
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/20850
dc.language.iso en
dc.source.bitstream archive/lib.dr.iastate.edu/ece_conf/3/2002_Rice_GenealogicalApproach.pdf|||Fri Jan 14 23:17:33 UTC 2022
dc.subject.disciplines Information Security
dc.subject.disciplines Systems and Communications
dc.title A Genealogical Approach to Analyzing Post-Mortem Denial of Service Attacks
dc.type article
dc.type.genre conference
dspace.entity.type Publication
relation.isOrgUnitOfPublication a75a044c-d11e-44cd-af4f-dab1d83339ff
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
2002_Rice_GenealogicalApproach.pdf
Size:
120.16 KB
Format:
Adobe Portable Document Format
Description: