On Blowback Traffic on the Internet

05/08/2023
by   Dallan Goldblatt, et al.
0

This paper considers the phenomenon where a single probe to a target generates multiple, sometimes numerous, packets in response – which we term "blowback". Understanding blowback is important because attackers can leverage it to launch amplified denial of service attacks by redirecting blowback towards a victim. Blowback also has serious implications for Internet researchers since their experimental setups must cope with bursts of blowback traffic. We find that tens of thousands, and in some protocols, hundreds of thousands, of hosts generate blowback, with orders of magnitude amplification on average. In fact, some prolific blowback generators produce millions of response packets in the aftermath of a single probe. We also find that blowback generators are fairly stable over periods of weeks, so once identified, many of these hosts can be exploited by attackers for a long time.

READ FULL TEXT

page 6

page 7

research
03/24/2021

Zeroing in on Port 0 Traffic in the Wild

Internet services leverage transport protocol port numbers to specify th...
research
01/30/2023

Oscilloscope: Detecting BGP Hijacks in the Data Plane

The lack of security of the Internet routing protocol (BGP) has allowed ...
research
05/18/2022

Monitoring Security of Enterprise Hosts via DNS Data Analysis

Enterprise Networks are growing in scale and complexity, with heterogene...
research
06/06/2020

Bankrupt Covert Channel: Turning Network Predictability into Vulnerability

Recent years have seen a surge in the number of data leaks despite aggre...
research
08/15/2021

Spatial Temporal Analysis of 40,000,000,000,000 Internet Darkspace Packets

The Internet has never been more important to our society, and understan...
research
03/23/2021

Scam Pandemic: How Attackers Exploit Public Fear through Phishing

As the COVID-19 pandemic started triggering widespread lockdowns across ...
research
10/25/2020

Exploring Network-Wide Flow Data with Flowyager

Many network operations, ranging from attack investigation and mitigatio...

Please sign up or login with your details

Forgot password? Click here to reset