Sciweavers

Share
IMC
2005
ACM

Flooding Attacks by Exploiting Persistent Forwarding Loops

10 years 7 months ago
Flooding Attacks by Exploiting Persistent Forwarding Loops
In this paper, we present flooding attacks that exploit routing anomalies in the Internet. In particular, we focus on routing anomalies introduced by persistent forwarding loops. Persistent forwarding loops may share one or more links with forwarding paths to reachable addresses. An attacker can exploit persistent forwarding loops to overload the shared links to disrupt the Internet connectivity to those reachable addresses. To understand the extent of this vulnerability, we perform extensive measurements to systematically study persistent forwarding loops and the number of network addresses that can be affected. We find that persistent forwarding loops do exist in the current Internet. About 0.2% of routable addresses experience persistent forwarding loops and 0.21% of routable addresses can be attacked by exploiting persistent forwarding loops. In addition, 85.16% of the persistent forwarding loops appear within destination domains and they can be observed from various locations, ...
Jianhong Xia, Lixin Gao, Teng Fei
Added 26 Jun 2010
Updated 26 Jun 2010
Type Conference
Year 2005
Where IMC
Authors Jianhong Xia, Lixin Gao, Teng Fei
Comments (0)
books