Low rate DoS attack to monoprocess servers

3Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this work1, we present a vulnerability in monoprocess or monothreaded servers that allows the execution of DoS attacks with the peculiarity that they are generated by low rate traffic. This feature makes the attack less vulnerable to detection by current IDS systems, which usually expect high rate traffic. The intruder can take advantage of some knowledge about the inter-output times in the server to build the attack. We have simulated and tested it in a real environment, obtaining worrying conclusions due to the efficiency achieved by the attack, with low effort from the attacker. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Maciá-Fernández, G., Díaz-Verdejo, J. E., & García-Teodoro, P. (2006). Low rate DoS attack to monoprocess servers. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3934 LNCS, pp. 43–57). Springer Verlag. https://doi.org/10.1007/11734666_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free