skip to main content
10.1145/1866307.1866411acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

Losing control of the internet: using the data plane to attack the control plane

Published: 04 October 2010 Publication History
  • Get Citation Alerts
  • Abstract

    In this work, we introduce the Coordinated Cross Plane Session Termination, or CXPST, attack, a distributed denial of service attack that attacks the control plane of the Internet. CXPST extends previous work that demonstrates a vulnerability in routers that allows an adversary to disconnect a pair of routers using only data plane traffic. By carefully choosing BGP sessions to terminate, CXPST generates a surge of BGP updates that are seen by nearly all core routers on the Internet. This surge of updates surpasses the computational capacity of affected routers, crippling their ability to make routing decisions

    References

    [1]
    }}N. W. Group. RFC4271 - A Border Gateway Protocol 4 (BGP-4). http://tools.ietf.org/html/rfc4271, January 2006.
    [2]
    }}G. Sinclair, C. Nunnery, and B. B. Kang. The Waledac protocol: The how and why. In In proceeding the IEEE International Conference on Malicious and Unwanted Software (MALWARE), pages 69--77, October 2009.
    [3]
    }}K. Sriram, D. Montgomery, O. Borchert, O. Kim, and D. R. Kuhn. Study of BGP peering session attacks and their impacts on routing performance. IEEE Journal on Selected Areas in Communications, 24(10):1901--1915, 2006.
    [4]
    }}A. Studer and A. Perrig. The Coremelt attack. In Proceedings of the European Symposium on Research in Computer Security (ESORICS), Sept. 2009.
    [5]
    }}F. Wang, Z. M. Mao, J. Wang, L. Gao, and R. Bush. A measurement study on the impact of routing events on end-to-end Internet path performance. SIGCOMM Comput. Commun. Rev., 36(4):375--386, 2006.
    [6]
    }}Y. Zhang, Z. M. Mao, and J. Wang. Low-rate TCP-targeted DoS attack disrupts Internet routing. In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2007.

    Cited By

    View all
    • (2024)A Secured Intrusion Detection System for Mobile Edge ComputingApplied Sciences10.3390/app1404143214:4(1432)Online publication date: 9-Feb-2024
    • (2023)FEAROL: Aging Flow Entries Based on Local Staircase Randomized Response for Secure SDN Flow TablesApplied Sciences10.3390/app1305298513:5(2985)Online publication date: 25-Feb-2023
    • (2023)Memory-saving LDoS Attacker Detection Algorithms in Zigbee NetworkJournal of Information Processing10.2197/ipsjjip.31.53731(537-549)Online publication date: 2023
    • Show More Cited By

    Index Terms

    1. Losing control of the internet: using the data plane to attack the control plane

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCS '10: Proceedings of the 17th ACM conference on Computer and communications security
      October 2010
      782 pages
      ISBN:9781450302456
      DOI:10.1145/1866307

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 October 2010

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. BGP
      2. DDoS
      3. botnet
      4. internet

      Qualifiers

      • Poster

      Conference

      CCS '10
      Sponsor:

      Acceptance Rates

      CCS '10 Paper Acceptance Rate 55 of 325 submissions, 17%;
      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)38
      • Downloads (Last 6 weeks)4

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)A Secured Intrusion Detection System for Mobile Edge ComputingApplied Sciences10.3390/app1404143214:4(1432)Online publication date: 9-Feb-2024
      • (2023)FEAROL: Aging Flow Entries Based on Local Staircase Randomized Response for Secure SDN Flow TablesApplied Sciences10.3390/app1305298513:5(2985)Online publication date: 25-Feb-2023
      • (2023)Memory-saving LDoS Attacker Detection Algorithms in Zigbee NetworkJournal of Information Processing10.2197/ipsjjip.31.53731(537-549)Online publication date: 2023
      • (2023)Poster: Cognitive Cyber – Dynamic, Adaptive Cyber Defense Systems for Massively Distributed, Autonomous, and Ad-hoc Computing EnvironmentsProceedings of the 17th ACM International Conference on Distributed and Event-based Systems10.1145/3583678.3603283(177-179)Online publication date: 27-Jun-2023
      • (2022)Disrupting the SDN Control Channel via Shared Links: Attacks and CountermeasuresIEEE/ACM Transactions on Networking10.1109/TNET.2022.316913630:5(2158-2172)Online publication date: Oct-2022
      • (2022)RL-Shield: Mitigating Target Link-Flooding Attacks Using SDN and Deep Reinforcement Learning Routing AlgorithmIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.311808119:6(4052-4067)Online publication date: 1-Nov-2022
      • (2022)NIE-GAT: node importance evaluation method for inter-domain routing network based on graph attention networkJournal of Computational Science10.1016/j.jocs.2022.10188565(101885)Online publication date: Nov-2022
      • (2021)LDoS Attacker Detection Algorithms in Zigbee Network2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics53846.2021.00022(43-50)Online publication date: Dec-2021
      • (2021)BottleNet: Hiding Network Bottlenecks Using SDN-Based Topology DeceptionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2021.307584516(3138-3153)Online publication date: 2021
      • (2021)New LDoS Attack in Zigbee Network and its Possible Countermeasures2021 IEEE International Conference on Smart Computing (SMARTCOMP)10.1109/SMARTCOMP52413.2021.00055(246-251)Online publication date: Aug-2021
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media