QUICsand: Quantifying QUIC Reconnaissance Scans and DoS Flooding Events

09/02/2021
by   Marcin Nawrocki, et al.
0

In this paper, we present first measurements of Internet background radiation originating from the emerging transport protocol QUIC. Our analysis is based on the UCSD network telescope, correlated with active measurements. We find that research projects dominate the QUIC scanning ecosystem but also discover traffic from non-benign sources. We argue that although QUIC has been carefully designed to restrict reflective amplification attacks, the QUIC handshake is prone to resource exhaustion attacks, similar to TCP SYN floods. We confirm this conjecture by showing how this attack vector is already exploited in multi-vector attacks: On average, the Internet is exposed to four QUIC floods per hour and half of these attacks occur concurrently with other common attack types such as TCP/ICMP floods.

READ FULL TEXT
research
01/14/2019

Uncovering Vulnerable Industrial Control Systems from the Internet Core

Industrial control systems (ICS) are managed remotely with the help of d...
research
06/22/2020

IXmon: Detecting and Analyzing DRDoS Attacks at Internet Exchange Points

Distributed reflective denial of service (DRDoS) attacks are a popular c...
research
07/02/2020

Sorry, Shodan is not Enough! Assessing ICS Security via IXP Network Traffic Analysis

Modern Industrial Control Systems (ICSs) allow remote communication thro...
research
03/15/2022

A Wearables-Driven Attack on Examination Proctoring

Multiple choice questions are at the heart of many standardized tests an...
research
03/07/2021

DDoS Never Dies? An IXP Perspective on DDoS Amplification Attacks

DDoS attacks remain a major security threat to the continuous operation ...
research
03/01/2019

Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning

A novel class of extreme link-flooding DDoS (Distributed Denial of Servi...
research
04/03/2023

Is Stochastic Mirror Descent Vulnerable to Adversarial Delay Attacks? A Traffic Assignment Resilience Study

Intelligent Navigation Systems (INS) are exposed to an increasing number...

Please sign up or login with your details

Forgot password? Click here to reset