On Modeling Link Flooding Attacks and Defenses

  • Xin Wang
  • , Xiaobo Ma
  • , Jiahao Peng
  • , Jianfeng Li
  • , Lei Xue
  • , Wenjun Hu
  • , Li Feng

Research output: Contribution to journalArticlepeer-review

4 Scopus citations

Abstract

The emerging link flooding attacks (LFAs) are one type of attacks that attract significant attention in both academia and industry against the routing infrastructure. The attack traffic flows originating from bots (e.g., compromised IoT devices) are deliberately aggregated at upstream critical links and grow intensified, gradually making a network connected to the critical links disconnected. Although LFAs are far more sophisticated than traditional DDoS attacks, whether such sophistication comes without a downside has never been investigated. In this paper, by modeling link flooding attacks and defenses, we tackle a series of questions concerning the practical issues of LFAs. Specifically, from the perspective of attacks, we advance a novel notion of strike precision, and reveal that LFAs may exhibit attack interference (i.e., unexpectedly interfere the connectivity of innocent networks) which might undermine the stealthiness and persistence of LFAs. From the perspective of defenses, we make the first step to study attack intention, i.e., inversely inferring the target network to disconnect based on the identified links under attack. Furthermore, we consider a strong defender who employs traffic engineering to mitigate LFAs, and formulate the game-theoretic interactions between attackers and defenders. The experiment results show that attack interference is pervasive, and our proposed SPAH flooding strategy can substantially lower attack interference and increase strike precision. Moreover, we demonstrate that LFAs can be effectively mitigated based on traffic engineering from a game-theoretic perspective, wherein the defender can adopt non-cooperative measurement techniques to achieve light-weight and multi-protocol-based robust probe deployment.

Original languageEnglish
Pages (from-to)159198-159217
Number of pages20
JournalIEEE Access
Volume9
DOIs
StatePublished - 2021

Keywords

  • DDoS attack
  • link flooding attack
  • routing security

Fingerprint

Dive into the research topics of 'On Modeling Link Flooding Attacks and Defenses'. Together they form a unique fingerprint.

Cite this