Algorithms for Reconstructing DDoS Attack Graphs using Probabilistic Packet Marking

04/11/2023
by   Dina Barak-Pelleg, et al.
0

DoS and DDoS attacks are widely used and pose a constant threat. Here we explore Probability Packet Marking (PPM), one of the important methods for reconstructing the attack-graph and detect the attackers. We present two algorithms. Differently from others, their stopping time is not fixed a priori. It rather depends on the actual distance of the attacker from the victim. Our first algorithm returns the graph at the earliest feasible time, and turns out to guarantee high success probability. The second algorithm enables attaining any predetermined success probability at the expense of a longer runtime. We study the performance of the two algorithms theoretically, and compare them to other algorithms by simulation. Finally, we consider the order in which the marks corresponding to the various edges of the attack graph are obtained by the victim. We show that, although edges closer to the victim tend to be discovered earlier in the process than farther edges, the differences are much smaller than previously thought.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/11/2023

The Time for Reconstructing the Attack Graph in DDoS Attacks

Despite their frequency, denial-of-service (DoSDenial of Service (DoS), ...
research
01/14/2018

Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions

Current threat models typically consider all possible ways an attacker c...
research
12/02/2022

Scalable Edge Blocking Algorithms for Defending Active Directory Style Attack Graphs

Active Directory (AD) is the default security management system for Wind...
research
12/25/2021

Practical Fixed-Parameter Algorithms for Defending Active Directory Style Attack Graphs

Active Directory is the default security management system for Windows d...
research
11/30/2021

COREATTACK: Breaking Up the Core Structure of Graphs

The concept of k-core in complex networks plays a key role in many appli...
research
08/31/2023

Everyone Can Attack: Repurpose Lossy Compression as a Natural Backdoor Attack

The vulnerabilities to backdoor attacks have recently threatened the tru...
research
11/18/2020

On the Feasibility and Enhancement of the Tuple Space Explosion Attack against Open vSwitch

Being a crucial part of networked systems, packet classification has to ...

Please sign up or login with your details

Forgot password? Click here to reset