Skip to main content

Abusing TCP Retransmission for DoS Attack Inside Virtual Network

  • Conference paper
  • First Online:
Information Security Applications (WISA 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10763))

Included in the following conference series:

Abstract

Among DoS attack techniques, abusing UDP-based public servers like DNS or NTP for reflective amplification attack is continued to pose a great threat. Recent studies show that attacker can also use TCP retransmission before the three-way-handshake completion to perform this kind of attack. In this paper, we focus on the virtual environment, in which we evaluate the potential of abusing the virtual switch system to perform amplification attack. We created a virtual network that able to connect to an external network and observed the virtual switch system’s behavior while receiving TCP packets from outside the network. We show that the virtual switch system itself can retransmit TCP packets and therefore can be abused for amplification attack by an internal attacker. In other words, he/she can make amplification using TCP hosts from outside the network and the virtual switch system’s retransmission ability. Furthermore, we test the endurance of different OS and show that Windows OS family and macOS are more vulnerable than Linux Ubuntu OS against this kind of attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kührer, M., Hupperich, T., Rossow, C., Holz, T.: Hell of a handshake: abusing TCP for reflective amplification DDoS attacks. In: 8th USENIX Workshop on Offensive Technologies (WOOT 2014), August 2014

    Google Scholar 

  2. Kührer, M. Hupperich, T., Rossow, C., Holz, T.: Exit from hell? Reducing the impact of amplification DDoS attacks. In: 23rd USENIX Security Symposium (USENIX Security 2014), August 2014

    Google Scholar 

  3. Rossow, C.: Amplification hell: revisiting network protocols for DDoS abuse. In: Symposium on Network and Distributed System Security (NDSS), February 2014. https://www.internetsociety.org/sites/default/files/01_5.pdf. Accessed 30 May 2017

  4. IBM: Reviewing a year of serious data breaches, major attacks and new vulnerabilities, April 2016. https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=SEP03394USEN. Accessed 30 May 2017

  5. IETF: Transmission Control Protocol, DARPA Internet Program Protocol Specification RFC793 (1981). https://tools.ietf.org/html/rfc793. Accessed 30 May 2017

  6. Nmap (“Network Mapper”) v7.12. http://nmap.org

  7. Famatech: Advanced IP Scanner v2.4. http://www.advanced-ip-scanner.com/

  8. Wireshark: Network protocol analyzer, Wireshark v2.2.6. https://www.wireshark.org/

  9. VMWare: Workstation for Windows, VMWare Workstation Pro 12. https://www.vmware.com/products/workstation.html

  10. FSN: The economy is flat so why are financials cloud vendors growing at more than 90 percent per annum?, March 2013. http://www.fsn.co.uk/channel_outsourcing/. Accessed 30 May 2017

Download references

Acknowledgment

This work was supported by JSPS KAKENHI Grant Number 17K06455.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Son Duc Nguyen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nguyen, S.D., Mimura, M., Tanaka, H. (2018). Abusing TCP Retransmission for DoS Attack Inside Virtual Network. In: Kang, B., Kim, T. (eds) Information Security Applications. WISA 2017. Lecture Notes in Computer Science(), vol 10763. Springer, Cham. https://doi.org/10.1007/978-3-319-93563-8_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-93563-8_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-93562-1

  • Online ISBN: 978-3-319-93563-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics