The new threat to internet: DNP attack with the attacking flows strategizing technology

Summary Distributed network paralyzing (DNP) attack, a kind of distributed denial‐of‐service attack that utilize botnet to congest and paralyze autonomous system level network, is a serious threat to network security. In this article, it is indicated that the most difficulty of DNP attack is strateg...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of communication systems 2015-04, Vol.28 (6), p.1126-1139
Hauptverfasser: Li, Heshuai, Zhu, Junhu, Qiu, Han, Wang, Qingxian, Zhou, Tianyang, Li, Hang
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1139
container_issue 6
container_start_page 1126
container_title International journal of communication systems
container_volume 28
creator Li, Heshuai
Zhu, Junhu
Qiu, Han
Wang, Qingxian
Zhou, Tianyang
Li, Hang
description Summary Distributed network paralyzing (DNP) attack, a kind of distributed denial‐of‐service attack that utilize botnet to congest and paralyze autonomous system level network, is a serious threat to network security. In this article, it is indicated that the most difficulty of DNP attack is strategizing DNP attacking flows automatically from the perspective of the attacker. For this outstanding issue, we introduce the DNP attacking flows strategizing technology, which can help an attacker to launch DNP attack efficiently through a series of attacking resources division–target links and attacking paths orientation–flux planning process. Through simulation, we demonstrate that the feasibility of attacking flows strategizing technology and prove that an attacker who controls a large‐scale botnet can utilize DNP attack to seriously threat the network security. At last, from the perspective of the defender, it is indicated that the network security researcher should strengthen the relevant research to defend the DNP attack. Copyright © 2014 John Wiley & Sons, Ltd. In distributed network paralyzing attack, for instance Coordinated Cross Plane Session Termination, a set of target links should be attacked simultaneously. In this case, how to strategize attacking flows is very important. For example, A and B are target links; link 1 is not a target, but if link 1 is congested, attacking flows from segment 2 cannot reach A and B, the attack may fail. If there are more target, strategizing will be more difficult; distributed network paralyzing attacking flows strategizing technology will solve this problem.
doi_str_mv 10.1002/dac.2748
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1677955142</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1677955142</sourcerecordid><originalsourceid>FETCH-LOGICAL-c4348-5e91a7a4704af002744bad22079c2da3b9e8f6d3634fb4d2f16f20f0e037009c3</originalsourceid><addsrcrecordid>eNp10MtKw0AUBuAgCtYq-AgDbtykzi2ZxF1pbRRqdVHpcpgmZ9q0aVJnpsT69Ca0KAquzoWPw-H3vGuCewRjepeptEcFj068DsFx7BPCyGnbC-4HLCDn3oW1K4xxRMOg482mS0Al1MgtDSiHXIXy0oEpwd2j4eQVKedUukZ17paNgeOclwuki6q2yDqjHCzyz3blIF2WVVEt9pfemVaFhatj7Xpvo4fp4NEfvyRPg_7YTznjkR9ATJRQXGCudPO-4HyuMkqxiFOaKTaPIdJhxkLG9ZxnVJNQU6wxYCYwjlPW9W4Pd7emet-BdXKT2xSKQpVQ7awkoRBxEBBOG3rzh66qnSmb7xoVUhazKMI_B1NTWWtAy63JN8rsJcGyTVg2Ccs24Yb6B1rnBez_dXLYH_z2uXXw8e2VWctQMBHI2SSRzyJI2Igmcsq-AC2NiiY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1662393880</pqid></control><display><type>article</type><title>The new threat to internet: DNP attack with the attacking flows strategizing technology</title><source>Wiley Online Library All Journals</source><creator>Li, Heshuai ; Zhu, Junhu ; Qiu, Han ; Wang, Qingxian ; Zhou, Tianyang ; Li, Hang</creator><creatorcontrib>Li, Heshuai ; Zhu, Junhu ; Qiu, Han ; Wang, Qingxian ; Zhou, Tianyang ; Li, Hang</creatorcontrib><description>Summary Distributed network paralyzing (DNP) attack, a kind of distributed denial‐of‐service attack that utilize botnet to congest and paralyze autonomous system level network, is a serious threat to network security. In this article, it is indicated that the most difficulty of DNP attack is strategizing DNP attacking flows automatically from the perspective of the attacker. For this outstanding issue, we introduce the DNP attacking flows strategizing technology, which can help an attacker to launch DNP attack efficiently through a series of attacking resources division–target links and attacking paths orientation–flux planning process. Through simulation, we demonstrate that the feasibility of attacking flows strategizing technology and prove that an attacker who controls a large‐scale botnet can utilize DNP attack to seriously threat the network security. At last, from the perspective of the defender, it is indicated that the network security researcher should strengthen the relevant research to defend the DNP attack. Copyright © 2014 John Wiley &amp; Sons, Ltd. In distributed network paralyzing attack, for instance Coordinated Cross Plane Session Termination, a set of target links should be attacked simultaneously. In this case, how to strategize attacking flows is very important. For example, A and B are target links; link 1 is not a target, but if link 1 is congested, attacking flows from segment 2 cannot reach A and B, the attack may fail. If there are more target, strategizing will be more difficult; distributed network paralyzing attacking flows strategizing technology will solve this problem.</description><identifier>ISSN: 1074-5351</identifier><identifier>EISSN: 1099-1131</identifier><identifier>DOI: 10.1002/dac.2748</identifier><language>eng</language><publisher>Chichester: Blackwell Publishing Ltd</publisher><subject>AFS matrix ; attacking path ; BGP ; botnet ; Computer information security ; Computer networks ; DNP attack ; flux planning ; Links ; Malware ; Networks ; Security ; Segments ; Simulation</subject><ispartof>International journal of communication systems, 2015-04, Vol.28 (6), p.1126-1139</ispartof><rights>Copyright © 2014 John Wiley &amp; Sons, Ltd.</rights><rights>Copyright © 2015 John Wiley &amp; Sons, Ltd.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c4348-5e91a7a4704af002744bad22079c2da3b9e8f6d3634fb4d2f16f20f0e037009c3</citedby><cites>FETCH-LOGICAL-c4348-5e91a7a4704af002744bad22079c2da3b9e8f6d3634fb4d2f16f20f0e037009c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1002%2Fdac.2748$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1002%2Fdac.2748$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,780,784,1417,27923,27924,45573,45574</link.rule.ids></links><search><creatorcontrib>Li, Heshuai</creatorcontrib><creatorcontrib>Zhu, Junhu</creatorcontrib><creatorcontrib>Qiu, Han</creatorcontrib><creatorcontrib>Wang, Qingxian</creatorcontrib><creatorcontrib>Zhou, Tianyang</creatorcontrib><creatorcontrib>Li, Hang</creatorcontrib><title>The new threat to internet: DNP attack with the attacking flows strategizing technology</title><title>International journal of communication systems</title><addtitle>Int. J. Commun. Syst</addtitle><description>Summary Distributed network paralyzing (DNP) attack, a kind of distributed denial‐of‐service attack that utilize botnet to congest and paralyze autonomous system level network, is a serious threat to network security. In this article, it is indicated that the most difficulty of DNP attack is strategizing DNP attacking flows automatically from the perspective of the attacker. For this outstanding issue, we introduce the DNP attacking flows strategizing technology, which can help an attacker to launch DNP attack efficiently through a series of attacking resources division–target links and attacking paths orientation–flux planning process. Through simulation, we demonstrate that the feasibility of attacking flows strategizing technology and prove that an attacker who controls a large‐scale botnet can utilize DNP attack to seriously threat the network security. At last, from the perspective of the defender, it is indicated that the network security researcher should strengthen the relevant research to defend the DNP attack. Copyright © 2014 John Wiley &amp; Sons, Ltd. In distributed network paralyzing attack, for instance Coordinated Cross Plane Session Termination, a set of target links should be attacked simultaneously. In this case, how to strategize attacking flows is very important. For example, A and B are target links; link 1 is not a target, but if link 1 is congested, attacking flows from segment 2 cannot reach A and B, the attack may fail. If there are more target, strategizing will be more difficult; distributed network paralyzing attacking flows strategizing technology will solve this problem.</description><subject>AFS matrix</subject><subject>attacking path</subject><subject>BGP</subject><subject>botnet</subject><subject>Computer information security</subject><subject>Computer networks</subject><subject>DNP attack</subject><subject>flux planning</subject><subject>Links</subject><subject>Malware</subject><subject>Networks</subject><subject>Security</subject><subject>Segments</subject><subject>Simulation</subject><issn>1074-5351</issn><issn>1099-1131</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><recordid>eNp10MtKw0AUBuAgCtYq-AgDbtykzi2ZxF1pbRRqdVHpcpgmZ9q0aVJnpsT69Ca0KAquzoWPw-H3vGuCewRjepeptEcFj068DsFx7BPCyGnbC-4HLCDn3oW1K4xxRMOg482mS0Al1MgtDSiHXIXy0oEpwd2j4eQVKedUukZ17paNgeOclwuki6q2yDqjHCzyz3blIF2WVVEt9pfemVaFhatj7Xpvo4fp4NEfvyRPg_7YTznjkR9ATJRQXGCudPO-4HyuMkqxiFOaKTaPIdJhxkLG9ZxnVJNQU6wxYCYwjlPW9W4Pd7emet-BdXKT2xSKQpVQ7awkoRBxEBBOG3rzh66qnSmb7xoVUhazKMI_B1NTWWtAy63JN8rsJcGyTVg2Ccs24Yb6B1rnBez_dXLYH_z2uXXw8e2VWctQMBHI2SSRzyJI2Igmcsq-AC2NiiY</recordid><startdate>201504</startdate><enddate>201504</enddate><creator>Li, Heshuai</creator><creator>Zhu, Junhu</creator><creator>Qiu, Han</creator><creator>Wang, Qingxian</creator><creator>Zhou, Tianyang</creator><creator>Li, Hang</creator><general>Blackwell Publishing Ltd</general><general>Wiley Subscription Services, Inc</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>7SC</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201504</creationdate><title>The new threat to internet: DNP attack with the attacking flows strategizing technology</title><author>Li, Heshuai ; Zhu, Junhu ; Qiu, Han ; Wang, Qingxian ; Zhou, Tianyang ; Li, Hang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c4348-5e91a7a4704af002744bad22079c2da3b9e8f6d3634fb4d2f16f20f0e037009c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>AFS matrix</topic><topic>attacking path</topic><topic>BGP</topic><topic>botnet</topic><topic>Computer information security</topic><topic>Computer networks</topic><topic>DNP attack</topic><topic>flux planning</topic><topic>Links</topic><topic>Malware</topic><topic>Networks</topic><topic>Security</topic><topic>Segments</topic><topic>Simulation</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Heshuai</creatorcontrib><creatorcontrib>Zhu, Junhu</creatorcontrib><creatorcontrib>Qiu, Han</creatorcontrib><creatorcontrib>Wang, Qingxian</creatorcontrib><creatorcontrib>Zhou, Tianyang</creatorcontrib><creatorcontrib>Li, Hang</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of communication systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Heshuai</au><au>Zhu, Junhu</au><au>Qiu, Han</au><au>Wang, Qingxian</au><au>Zhou, Tianyang</au><au>Li, Hang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>The new threat to internet: DNP attack with the attacking flows strategizing technology</atitle><jtitle>International journal of communication systems</jtitle><addtitle>Int. J. Commun. Syst</addtitle><date>2015-04</date><risdate>2015</risdate><volume>28</volume><issue>6</issue><spage>1126</spage><epage>1139</epage><pages>1126-1139</pages><issn>1074-5351</issn><eissn>1099-1131</eissn><abstract>Summary Distributed network paralyzing (DNP) attack, a kind of distributed denial‐of‐service attack that utilize botnet to congest and paralyze autonomous system level network, is a serious threat to network security. In this article, it is indicated that the most difficulty of DNP attack is strategizing DNP attacking flows automatically from the perspective of the attacker. For this outstanding issue, we introduce the DNP attacking flows strategizing technology, which can help an attacker to launch DNP attack efficiently through a series of attacking resources division–target links and attacking paths orientation–flux planning process. Through simulation, we demonstrate that the feasibility of attacking flows strategizing technology and prove that an attacker who controls a large‐scale botnet can utilize DNP attack to seriously threat the network security. At last, from the perspective of the defender, it is indicated that the network security researcher should strengthen the relevant research to defend the DNP attack. Copyright © 2014 John Wiley &amp; Sons, Ltd. In distributed network paralyzing attack, for instance Coordinated Cross Plane Session Termination, a set of target links should be attacked simultaneously. In this case, how to strategize attacking flows is very important. For example, A and B are target links; link 1 is not a target, but if link 1 is congested, attacking flows from segment 2 cannot reach A and B, the attack may fail. If there are more target, strategizing will be more difficult; distributed network paralyzing attacking flows strategizing technology will solve this problem.</abstract><cop>Chichester</cop><pub>Blackwell Publishing Ltd</pub><doi>10.1002/dac.2748</doi><tpages>14</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1074-5351
ispartof International journal of communication systems, 2015-04, Vol.28 (6), p.1126-1139
issn 1074-5351
1099-1131
language eng
recordid cdi_proquest_miscellaneous_1677955142
source Wiley Online Library All Journals
subjects AFS matrix
attacking path
BGP
botnet
Computer information security
Computer networks
DNP attack
flux planning
Links
Malware
Networks
Security
Segments
Simulation
title The new threat to internet: DNP attack with the attacking flows strategizing technology
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T18%3A22%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=The%20new%20threat%20to%20internet:%20DNP%20attack%20with%20the%20attacking%20flows%20strategizing%20technology&rft.jtitle=International%20journal%20of%20communication%20systems&rft.au=Li,%20Heshuai&rft.date=2015-04&rft.volume=28&rft.issue=6&rft.spage=1126&rft.epage=1139&rft.pages=1126-1139&rft.issn=1074-5351&rft.eissn=1099-1131&rft_id=info:doi/10.1002/dac.2748&rft_dat=%3Cproquest_cross%3E1677955142%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1662393880&rft_id=info:pmid/&rfr_iscdi=true