Multi-variant Network Address Hopping to Defend Stealthy Crossfire Attack

Boyang Zhou,Gaoning Pan,Chunming Wu,Kai Zhu,Wei Ruan
DOI: https://doi.org/10.1007/s11432-019-9921-7
2020-01-01
Science China Information Sciences
Abstract:Dear editor, Recently, crossfire attack has been witnessed as a new distributed denial-of-service (DDoS) weapon that can effectively cut off the data connections between the chosen target area (wd) of servers and the end hosts (H).The attack is launched by a network of bot (botnet) to drain bandwidth of persistent routes (PRs) in the indirect and lowrate data flooding towards the decoys that are located in upstream to the target, where the PRs are probed by the adversary who sends Internet control message protocol (ICMP) packets with different time-to-live (TTL) values, e.g., using traceroute [1].Such flooding is hard to be detected by firewalls or IDSes.
What problem does this paper attempt to address?