The new threat to internet: DNP attack with the attacking flows strategizing technology
Summary Distributed network paralyzing (DNP) attack, a kind of distributed denial‐of‐service attack that utilize botnet to congest and paralyze autonomous system level network, is a serious threat to network security. In this article, it is indicated that the most difficulty of DNP attack is strateg...
Gespeichert in:
Veröffentlicht in: | International journal of communication systems 2015-04, Vol.28 (6), p.1126-1139 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1139 |
---|---|
container_issue | 6 |
container_start_page | 1126 |
container_title | International journal of communication systems |
container_volume | 28 |
creator | Li, Heshuai Zhu, Junhu Qiu, Han Wang, Qingxian Zhou, Tianyang Li, Hang |
description | Summary
Distributed network paralyzing (DNP) attack, a kind of distributed denial‐of‐service attack that utilize botnet to congest and paralyze autonomous system level network, is a serious threat to network security. In this article, it is indicated that the most difficulty of DNP attack is strategizing DNP attacking flows automatically from the perspective of the attacker. For this outstanding issue, we introduce the DNP attacking flows strategizing technology, which can help an attacker to launch DNP attack efficiently through a series of attacking resources division–target links and attacking paths orientation–flux planning process. Through simulation, we demonstrate that the feasibility of attacking flows strategizing technology and prove that an attacker who controls a large‐scale botnet can utilize DNP attack to seriously threat the network security. At last, from the perspective of the defender, it is indicated that the network security researcher should strengthen the relevant research to defend the DNP attack. Copyright © 2014 John Wiley & Sons, Ltd.
In distributed network paralyzing attack, for instance Coordinated Cross Plane Session Termination, a set of target links should be attacked simultaneously. In this case, how to strategize attacking flows is very important. For example, A and B are target links; link 1 is not a target, but if link 1 is congested, attacking flows from segment 2 cannot reach A and B, the attack may fail. If there are more target, strategizing will be more difficult; distributed network paralyzing attacking flows strategizing technology will solve this problem. |
doi_str_mv | 10.1002/dac.2748 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1677955142</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1677955142</sourcerecordid><originalsourceid>FETCH-LOGICAL-c4348-5e91a7a4704af002744bad22079c2da3b9e8f6d3634fb4d2f16f20f0e037009c3</originalsourceid><addsrcrecordid>eNp10MtKw0AUBuAgCtYq-AgDbtykzi2ZxF1pbRRqdVHpcpgmZ9q0aVJnpsT69Ca0KAquzoWPw-H3vGuCewRjepeptEcFj068DsFx7BPCyGnbC-4HLCDn3oW1K4xxRMOg482mS0Al1MgtDSiHXIXy0oEpwd2j4eQVKedUukZ17paNgeOclwuki6q2yDqjHCzyz3blIF2WVVEt9pfemVaFhatj7Xpvo4fp4NEfvyRPg_7YTznjkR9ATJRQXGCudPO-4HyuMkqxiFOaKTaPIdJhxkLG9ZxnVJNQU6wxYCYwjlPW9W4Pd7emet-BdXKT2xSKQpVQ7awkoRBxEBBOG3rzh66qnSmb7xoVUhazKMI_B1NTWWtAy63JN8rsJcGyTVg2Ccs24Yb6B1rnBez_dXLYH_z2uXXw8e2VWctQMBHI2SSRzyJI2Igmcsq-AC2NiiY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1662393880</pqid></control><display><type>article</type><title>The new threat to internet: DNP attack with the attacking flows strategizing technology</title><source>Wiley Online Library All Journals</source><creator>Li, Heshuai ; Zhu, Junhu ; Qiu, Han ; Wang, Qingxian ; Zhou, Tianyang ; Li, Hang</creator><creatorcontrib>Li, Heshuai ; Zhu, Junhu ; Qiu, Han ; Wang, Qingxian ; Zhou, Tianyang ; Li, Hang</creatorcontrib><description>Summary
Distributed network paralyzing (DNP) attack, a kind of distributed denial‐of‐service attack that utilize botnet to congest and paralyze autonomous system level network, is a serious threat to network security. In this article, it is indicated that the most difficulty of DNP attack is strategizing DNP attacking flows automatically from the perspective of the attacker. For this outstanding issue, we introduce the DNP attacking flows strategizing technology, which can help an attacker to launch DNP attack efficiently through a series of attacking resources division–target links and attacking paths orientation–flux planning process. Through simulation, we demonstrate that the feasibility of attacking flows strategizing technology and prove that an attacker who controls a large‐scale botnet can utilize DNP attack to seriously threat the network security. At last, from the perspective of the defender, it is indicated that the network security researcher should strengthen the relevant research to defend the DNP attack. Copyright © 2014 John Wiley & Sons, Ltd.
In distributed network paralyzing attack, for instance Coordinated Cross Plane Session Termination, a set of target links should be attacked simultaneously. In this case, how to strategize attacking flows is very important. For example, A and B are target links; link 1 is not a target, but if link 1 is congested, attacking flows from segment 2 cannot reach A and B, the attack may fail. If there are more target, strategizing will be more difficult; distributed network paralyzing attacking flows strategizing technology will solve this problem.</description><identifier>ISSN: 1074-5351</identifier><identifier>EISSN: 1099-1131</identifier><identifier>DOI: 10.1002/dac.2748</identifier><language>eng</language><publisher>Chichester: Blackwell Publishing Ltd</publisher><subject>AFS matrix ; attacking path ; BGP ; botnet ; Computer information security ; Computer networks ; DNP attack ; flux planning ; Links ; Malware ; Networks ; Security ; Segments ; Simulation</subject><ispartof>International journal of communication systems, 2015-04, Vol.28 (6), p.1126-1139</ispartof><rights>Copyright © 2014 John Wiley & Sons, Ltd.</rights><rights>Copyright © 2015 John Wiley & Sons, Ltd.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c4348-5e91a7a4704af002744bad22079c2da3b9e8f6d3634fb4d2f16f20f0e037009c3</citedby><cites>FETCH-LOGICAL-c4348-5e91a7a4704af002744bad22079c2da3b9e8f6d3634fb4d2f16f20f0e037009c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1002%2Fdac.2748$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1002%2Fdac.2748$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,780,784,1417,27923,27924,45573,45574</link.rule.ids></links><search><creatorcontrib>Li, Heshuai</creatorcontrib><creatorcontrib>Zhu, Junhu</creatorcontrib><creatorcontrib>Qiu, Han</creatorcontrib><creatorcontrib>Wang, Qingxian</creatorcontrib><creatorcontrib>Zhou, Tianyang</creatorcontrib><creatorcontrib>Li, Hang</creatorcontrib><title>The new threat to internet: DNP attack with the attacking flows strategizing technology</title><title>International journal of communication systems</title><addtitle>Int. J. Commun. Syst</addtitle><description>Summary
Distributed network paralyzing (DNP) attack, a kind of distributed denial‐of‐service attack that utilize botnet to congest and paralyze autonomous system level network, is a serious threat to network security. In this article, it is indicated that the most difficulty of DNP attack is strategizing DNP attacking flows automatically from the perspective of the attacker. For this outstanding issue, we introduce the DNP attacking flows strategizing technology, which can help an attacker to launch DNP attack efficiently through a series of attacking resources division–target links and attacking paths orientation–flux planning process. Through simulation, we demonstrate that the feasibility of attacking flows strategizing technology and prove that an attacker who controls a large‐scale botnet can utilize DNP attack to seriously threat the network security. At last, from the perspective of the defender, it is indicated that the network security researcher should strengthen the relevant research to defend the DNP attack. Copyright © 2014 John Wiley & Sons, Ltd.
In distributed network paralyzing attack, for instance Coordinated Cross Plane Session Termination, a set of target links should be attacked simultaneously. In this case, how to strategize attacking flows is very important. For example, A and B are target links; link 1 is not a target, but if link 1 is congested, attacking flows from segment 2 cannot reach A and B, the attack may fail. If there are more target, strategizing will be more difficult; distributed network paralyzing attacking flows strategizing technology will solve this problem.</description><subject>AFS matrix</subject><subject>attacking path</subject><subject>BGP</subject><subject>botnet</subject><subject>Computer information security</subject><subject>Computer networks</subject><subject>DNP attack</subject><subject>flux planning</subject><subject>Links</subject><subject>Malware</subject><subject>Networks</subject><subject>Security</subject><subject>Segments</subject><subject>Simulation</subject><issn>1074-5351</issn><issn>1099-1131</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><recordid>eNp10MtKw0AUBuAgCtYq-AgDbtykzi2ZxF1pbRRqdVHpcpgmZ9q0aVJnpsT69Ca0KAquzoWPw-H3vGuCewRjepeptEcFj068DsFx7BPCyGnbC-4HLCDn3oW1K4xxRMOg482mS0Al1MgtDSiHXIXy0oEpwd2j4eQVKedUukZ17paNgeOclwuki6q2yDqjHCzyz3blIF2WVVEt9pfemVaFhatj7Xpvo4fp4NEfvyRPg_7YTznjkR9ATJRQXGCudPO-4HyuMkqxiFOaKTaPIdJhxkLG9ZxnVJNQU6wxYCYwjlPW9W4Pd7emet-BdXKT2xSKQpVQ7awkoRBxEBBOG3rzh66qnSmb7xoVUhazKMI_B1NTWWtAy63JN8rsJcGyTVg2Ccs24Yb6B1rnBez_dXLYH_z2uXXw8e2VWctQMBHI2SSRzyJI2Igmcsq-AC2NiiY</recordid><startdate>201504</startdate><enddate>201504</enddate><creator>Li, Heshuai</creator><creator>Zhu, Junhu</creator><creator>Qiu, Han</creator><creator>Wang, Qingxian</creator><creator>Zhou, Tianyang</creator><creator>Li, Hang</creator><general>Blackwell Publishing Ltd</general><general>Wiley Subscription Services, Inc</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>7SC</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201504</creationdate><title>The new threat to internet: DNP attack with the attacking flows strategizing technology</title><author>Li, Heshuai ; Zhu, Junhu ; Qiu, Han ; Wang, Qingxian ; Zhou, Tianyang ; Li, Hang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c4348-5e91a7a4704af002744bad22079c2da3b9e8f6d3634fb4d2f16f20f0e037009c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>AFS matrix</topic><topic>attacking path</topic><topic>BGP</topic><topic>botnet</topic><topic>Computer information security</topic><topic>Computer networks</topic><topic>DNP attack</topic><topic>flux planning</topic><topic>Links</topic><topic>Malware</topic><topic>Networks</topic><topic>Security</topic><topic>Segments</topic><topic>Simulation</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Heshuai</creatorcontrib><creatorcontrib>Zhu, Junhu</creatorcontrib><creatorcontrib>Qiu, Han</creatorcontrib><creatorcontrib>Wang, Qingxian</creatorcontrib><creatorcontrib>Zhou, Tianyang</creatorcontrib><creatorcontrib>Li, Hang</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of communication systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Heshuai</au><au>Zhu, Junhu</au><au>Qiu, Han</au><au>Wang, Qingxian</au><au>Zhou, Tianyang</au><au>Li, Hang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>The new threat to internet: DNP attack with the attacking flows strategizing technology</atitle><jtitle>International journal of communication systems</jtitle><addtitle>Int. J. Commun. Syst</addtitle><date>2015-04</date><risdate>2015</risdate><volume>28</volume><issue>6</issue><spage>1126</spage><epage>1139</epage><pages>1126-1139</pages><issn>1074-5351</issn><eissn>1099-1131</eissn><abstract>Summary
Distributed network paralyzing (DNP) attack, a kind of distributed denial‐of‐service attack that utilize botnet to congest and paralyze autonomous system level network, is a serious threat to network security. In this article, it is indicated that the most difficulty of DNP attack is strategizing DNP attacking flows automatically from the perspective of the attacker. For this outstanding issue, we introduce the DNP attacking flows strategizing technology, which can help an attacker to launch DNP attack efficiently through a series of attacking resources division–target links and attacking paths orientation–flux planning process. Through simulation, we demonstrate that the feasibility of attacking flows strategizing technology and prove that an attacker who controls a large‐scale botnet can utilize DNP attack to seriously threat the network security. At last, from the perspective of the defender, it is indicated that the network security researcher should strengthen the relevant research to defend the DNP attack. Copyright © 2014 John Wiley & Sons, Ltd.
In distributed network paralyzing attack, for instance Coordinated Cross Plane Session Termination, a set of target links should be attacked simultaneously. In this case, how to strategize attacking flows is very important. For example, A and B are target links; link 1 is not a target, but if link 1 is congested, attacking flows from segment 2 cannot reach A and B, the attack may fail. If there are more target, strategizing will be more difficult; distributed network paralyzing attacking flows strategizing technology will solve this problem.</abstract><cop>Chichester</cop><pub>Blackwell Publishing Ltd</pub><doi>10.1002/dac.2748</doi><tpages>14</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1074-5351 |
ispartof | International journal of communication systems, 2015-04, Vol.28 (6), p.1126-1139 |
issn | 1074-5351 1099-1131 |
language | eng |
recordid | cdi_proquest_miscellaneous_1677955142 |
source | Wiley Online Library All Journals |
subjects | AFS matrix attacking path BGP botnet Computer information security Computer networks DNP attack flux planning Links Malware Networks Security Segments Simulation |
title | The new threat to internet: DNP attack with the attacking flows strategizing technology |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T18%3A22%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=The%20new%20threat%20to%20internet:%20DNP%20attack%20with%20the%20attacking%20flows%20strategizing%20technology&rft.jtitle=International%20journal%20of%20communication%20systems&rft.au=Li,%20Heshuai&rft.date=2015-04&rft.volume=28&rft.issue=6&rft.spage=1126&rft.epage=1139&rft.pages=1126-1139&rft.issn=1074-5351&rft.eissn=1099-1131&rft_id=info:doi/10.1002/dac.2748&rft_dat=%3Cproquest_cross%3E1677955142%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1662393880&rft_id=info:pmid/&rfr_iscdi=true |