SF-DRDoS: the Store-and-flood Distributed Reflective Denial of Service Attack.

Bingshuang Liu,Jun Li,Tao Wei,Skyler Berg,Jiayi Ye,Chen Li,Chao Zhang,Jianyu Zhang,Xinhui Han
DOI: https://doi.org/10.1016/j.comcom.2015.06.008
IF: 5.047
2015-01-01
Computer Communications
Abstract:Distributed reflective denial of service (DRDoS) attacks, especially those based on UDP reflection and amplification, can generate hundreds of gigabits per second of attack traffic, and have become a significant threat to Internet security. In this paper we show that an attacker can further make the DRDoS attack more dangerous. In particular, we describe a new DRDoS attack called store-and-flood DRDoS, or SF-DRDoS, which leverages peer-to-peer (P2P) file-sharing networks. An attacker can store carefully prepared data on reflector nodes before the flooding phase, to greatly increase the amplification factor of an attack. In this way, SF-DRDoS is more surreptitious and powerful than traditional DRDoS. We present two prototype SF-DRDoS attacks on two popular Kademlia-based P2P file-sharing networks, Mad and BT-DHT. Experiments in real-world environments showed that, this attack can achieve an amplification factor of 2400 on average in Mad, and reach an upper bound of attack bandwidth at 670 Gbps and 10 Tbps for Kad and BT-DHT, respectively. We also propose some candidate defenses to mitigate the SF-DRDoS threat. (C) 2015 Elsevier B.V. All rights reserved.
What problem does this paper attempt to address?