Study on Simulated ZMW Attack
- DOI
- 10.2991/emim-15.2015.137How to use a DOI?
- Keywords
- ZMW; BGP session; LDoS; BGP table version number; Route flapping
- Abstract
ZMW is a BGP-session-targeted LDoS (Low-Rate Denial of Service) attack, which can leave a drastic impact on the network infrastructure. Therefore, it’s essential to identify and know the attack. In this paper, we first establish a small-scale and double-link experimental network of BGP on the network simulator GNS3 to study this attack and generate LDoS attack flows by getting the required parameters. Then, we redo ZMW attack on target links through single nodes. We measure the overall effect of ZMW attack by monitoring the data traffic of target links and redundant links, and identify the links with route flapping by gathering the characteristic parameter, BGP table version number, and finally measure the attack efficiency of ZMW with adjusting the lengthen of UDP packet. We study and grasp this attack technology against BGP session, so as to give proper prevention scheme in time, thus effectively ensure the security of network and communication.
- Copyright
- © 2015, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Xingman Chen AU - Yanhui Guo AU - Qi Li PY - 2015/04 DA - 2015/04 TI - Study on Simulated ZMW Attack BT - Proceedings of the 2015 International Conference on Education, Management, Information and Medicine PB - Atlantis Press SP - 690 EP - 698 SN - 2352-5428 UR - https://doi.org/10.2991/emim-15.2015.137 DO - 10.2991/emim-15.2015.137 ID - Chen2015/04 ER -