In the last years the Internet has become a primary tool for information dissemination, spreading itself on the entire world and becoming a necessary communication system. More recently, thanks to the advent of the Internet of Things paradigm, a wide range of objects (such as washing machines, thermostats, fridges) is able to communicate on the Internet. As a consequence of this large adoption, due to economic motivations, the Internet is often targeted by cyber-criminals. In this paper, we present a novel attack called Slow Next, targeting Internet services (IoT, cloud, mobile hosted, etc.). We analyze that the proposed menace is able to lead a Denial of Service on different categories of network protocols using a low amount of network bandwidth. Moreover, since connections behavior is legitimate, Slow Next is able to elude detection systems. The attack represents therefore a potential menace on the cybersecurity field.

Designing and Modeling the Slow Next DoS Attack

Enrico Cambiaso;Gianluca Papaleo;Maurizio Aiello
2015

Abstract

In the last years the Internet has become a primary tool for information dissemination, spreading itself on the entire world and becoming a necessary communication system. More recently, thanks to the advent of the Internet of Things paradigm, a wide range of objects (such as washing machines, thermostats, fridges) is able to communicate on the Internet. As a consequence of this large adoption, due to economic motivations, the Internet is often targeted by cyber-criminals. In this paper, we present a novel attack called Slow Next, targeting Internet services (IoT, cloud, mobile hosted, etc.). We analyze that the proposed menace is able to lead a Denial of Service on different categories of network protocols using a low amount of network bandwidth. Moreover, since connections behavior is legitimate, Slow Next is able to elude detection systems. The attack represents therefore a potential menace on the cybersecurity field.
2015
Istituto di Elettronica e di Ingegneria dell'Informazione e delle Telecomunicazioni - IEIIT
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/291678
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact