Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing

10/01/2021
by   Fabio Streun, et al.
0

Many systems today rely heavily on virtual private network (VPN) technology to connect networks and protect their services on the Internet. While prior studies compare the performance of different implementations, they do not consider adversarial settings. To address this gap, we evaluate the resilience of VPN implementations to flooding-based denial-of-service (DoS) attacks. We focus on a class of stateless flooding attacks, which are particularly threatening to real connections, as they can be carried out by an off-path attacker using spoofed IP addresses. We have implemented various attacks to evaluate DoS resilience for three major open-source VPN solutions, with surprising results: On high-performance hardware with a 40 Gb/s interface, data transfer over established WireGuard connections can be fully denied with 700 Mb/s of attack traffic. For strongSwan (IPsec), an adversary can block any legitimate connections from being established using only 75 Mb/s of attack traffic. OpenVPN can be overwhelmed with 100 Mb/s of flood traffic denying data transfer through the VPN connection as well as connection establishment completely. Further analysis has revealed implementation bugs and major inefficiencies in the implementations related to concurrency aspects. These findings demonstrate a need for more adversarial testing of VPN implementations with respect to DoS resilience.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/02/2021

Resilience to Denial-of-Service and Integrity Attacks: A Structured Systems Approach

The resilience of cyberphysical systems to denial-of-service (DoS) and i...
research
05/30/2021

Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks

Machine learning and deep learning algorithms can be used to classify en...
research
08/29/2020

Off-Path TCP Exploits of the Mixed IPID Assignment

In this paper, we uncover a new off-path TCP hijacking attack that can b...
research
02/25/2020

Evaluating complexity and resilience trade-offs in emerging memory inference machines

Neuromorphic-style inference only works well if limited hardware resourc...
research
04/03/2023

Is Stochastic Mirror Descent Vulnerable to Adversarial Delay Attacks? A Traffic Assignment Resilience Study

Intelligent Navigation Systems (INS) are exposed to an increasing number...
research
10/02/2022

GANTouch: An Attack-Resilient Framework for Touch-based Continuous Authentication System

Previous studies have shown that commonly studied (vanilla) implementati...
research
03/06/2020

Me Love (SYN-)Cookies: SYN Flood Mitigation in Programmable Data Planes

The SYN flood attack is a common attack strategy on the Internet, which ...

Please sign up or login with your details

Forgot password? Click here to reset