skip to main content
10.1145/1866307.1866411acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

Losing control of the internet: using the data plane to attack the control plane

Published: 04 October 2010 Publication History

Abstract

In this work, we introduce the Coordinated Cross Plane Session Termination, or CXPST, attack, a distributed denial of service attack that attacks the control plane of the Internet. CXPST extends previous work that demonstrates a vulnerability in routers that allows an adversary to disconnect a pair of routers using only data plane traffic. By carefully choosing BGP sessions to terminate, CXPST generates a surge of BGP updates that are seen by nearly all core routers on the Internet. This surge of updates surpasses the computational capacity of affected routers, crippling their ability to make routing decisions

References

[1]
}}N. W. Group. RFC4271 - A Border Gateway Protocol 4 (BGP-4). http://tools.ietf.org/html/rfc4271, January 2006.
[2]
}}G. Sinclair, C. Nunnery, and B. B. Kang. The Waledac protocol: The how and why. In In proceeding the IEEE International Conference on Malicious and Unwanted Software (MALWARE), pages 69--77, October 2009.
[3]
}}K. Sriram, D. Montgomery, O. Borchert, O. Kim, and D. R. Kuhn. Study of BGP peering session attacks and their impacts on routing performance. IEEE Journal on Selected Areas in Communications, 24(10):1901--1915, 2006.
[4]
}}A. Studer and A. Perrig. The Coremelt attack. In Proceedings of the European Symposium on Research in Computer Security (ESORICS), Sept. 2009.
[5]
}}F. Wang, Z. M. Mao, J. Wang, L. Gao, and R. Bush. A measurement study on the impact of routing events on end-to-end Internet path performance. SIGCOMM Comput. Commun. Rev., 36(4):375--386, 2006.
[6]
}}Y. Zhang, Z. M. Mao, and J. Wang. Low-rate TCP-targeted DoS attack disrupts Internet routing. In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2007.

Cited By

View all
  • (2024)A Secured Intrusion Detection System for Mobile Edge ComputingApplied Sciences10.3390/app1404143214:4(1432)Online publication date: 9-Feb-2024
  • (2024)KNI-DRL: Key Nodes Identification Method Based on Deep Reinforcement Learning in Inter-domain Routing Networks2024 9th International Conference on Computer and Communication Systems (ICCCS)10.1109/ICCCS61882.2024.10603253(698-705)Online publication date: 19-Apr-2024
  • (2024)Resilience-by-Design in 6G Networks: Literature Review and Novel Enabling ConceptsIEEE Access10.1109/ACCESS.2024.348027512(155666-155695)Online publication date: 2024
  • Show More Cited By

Index Terms

  1. Losing control of the internet: using the data plane to attack the control plane

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '10: Proceedings of the 17th ACM conference on Computer and communications security
    October 2010
    782 pages
    ISBN:9781450302456
    DOI:10.1145/1866307

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 October 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. BGP
    2. DDoS
    3. botnet
    4. internet

    Qualifiers

    • Poster

    Conference

    CCS '10
    Sponsor:

    Acceptance Rates

    CCS '10 Paper Acceptance Rate 55 of 325 submissions, 17%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)51
    • Downloads (Last 6 weeks)19
    Reflects downloads up to 28 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Secured Intrusion Detection System for Mobile Edge ComputingApplied Sciences10.3390/app1404143214:4(1432)Online publication date: 9-Feb-2024
    • (2024)KNI-DRL: Key Nodes Identification Method Based on Deep Reinforcement Learning in Inter-domain Routing Networks2024 9th International Conference on Computer and Communication Systems (ICCCS)10.1109/ICCCS61882.2024.10603253(698-705)Online publication date: 19-Apr-2024
    • (2024)Resilience-by-Design in 6G Networks: Literature Review and Novel Enabling ConceptsIEEE Access10.1109/ACCESS.2024.348027512(155666-155695)Online publication date: 2024
    • (2023)FEAROL: Aging Flow Entries Based on Local Staircase Randomized Response for Secure SDN Flow TablesApplied Sciences10.3390/app1305298513:5(2985)Online publication date: 25-Feb-2023
    • (2023)Memory-saving LDoS Attacker Detection Algorithms in Zigbee NetworkJournal of Information Processing10.2197/ipsjjip.31.53731(537-549)Online publication date: 2023
    • (2023)Poster: Cognitive Cyber – Dynamic, Adaptive Cyber Defense Systems for Massively Distributed, Autonomous, and Ad-hoc Computing EnvironmentsProceedings of the 17th ACM International Conference on Distributed and Event-based Systems10.1145/3583678.3603283(177-179)Online publication date: 27-Jun-2023
    • (2022)Disrupting the SDN Control Channel via Shared Links: Attacks and CountermeasuresIEEE/ACM Transactions on Networking10.1109/TNET.2022.316913630:5(2158-2172)Online publication date: Oct-2022
    • (2022)RL-Shield: Mitigating Target Link-Flooding Attacks Using SDN and Deep Reinforcement Learning Routing AlgorithmIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.311808119:6(4052-4067)Online publication date: 1-Nov-2022
    • (2022)NIE-GAT: node importance evaluation method for inter-domain routing network based on graph attention networkJournal of Computational Science10.1016/j.jocs.2022.10188565(101885)Online publication date: Nov-2022
    • (2021)CFM-RFM: A Cascading Failure Model for Inter-Domain Routing Systems with the Recovery Feedback MechanismInformation10.3390/info1206024712:6(247)Online publication date: 14-Jun-2021
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media