On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks

09/13/2017
by   Marcilio O. O. Lemos, et al.
0

Telephony Denial of Service (TDoS) attacks target telephony services, such as Voice over IP (VoIP), not allowing legitimate users to make calls. There are few defenses that attempt to mitigate TDoS attacks, most of them using IP filtering, with limited applicability. In our previous work, we proposed to use selective strategies for mitigating HTTP Application-Layer DDoS Attacks demonstrating their effectiveness in mitigating different types of attacks. Developing such types of defenses is challenging as there are many design options, eg, which dropping functions and selection algorithms to use. Our first contribution is to demonstrate both experimentally and by using formal verification that selective strategies are suitable for mitigating TDoS attacks. We used our formal model to help decide which selective strategies to use with much less effort than carrying out experiments. Our second contribution is a detailed comparison of the results obtained from our formal models and the results obtained by carrying out experiments. We demonstrate that formal methods is a powerful tool for specifying defenses for mitigating Distributed Denial of Service attacks allowing to increase our confidence on the proposed defense before actual implementation.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/24/2022

Towards Effective and Robust Neural Trojan Defenses via Input Filtering

Trojan attacks on deep neural networks are both dangerous and surreptiti...
research
04/08/2021

Adversarial Learning Inspired Emerging Side-Channel Attacks and Defenses

Evolving attacks on the vulnerabilities of the computing systems demand ...
research
06/09/2020

SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses

Control logic programs play a critical role in industrial control system...
research
08/22/2023

Designing an attack-defense game: how to increase robustness of financial transaction models via a competition

Given the escalating risks of malicious attacks in the finance sector an...
research
01/26/2022

Autonomous Cyber Defense Introduces Risk: Can We Manage the Risk?

From denial-of-service attacks to spreading of ransomware or other malwa...
research
06/24/2020

Less is More: Exploiting Social Trust to Increase the Effectiveness of a Deception Attack

Cyber attacks such as phishing, IRS scams, etc., still are successful in...
research
08/04/2021

Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability

This work proposes a new class of proactive attacks called the Informati...

Please sign up or login with your details

Forgot password? Click here to reset