Nothing Special   »   [go: up one dir, main page]

Skip to main content

Formal Specification and Verification of a Selective Defense for TDoS Attacks

  • Conference paper
  • First Online:
Rewriting Logic and Its Applications (WRLA 2016)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9942))

Included in the following conference series:

Abstract

Telephony Denial of Service (TDoS) attacks target telephony services, such as Voice over IP, not allowing legitimate users to make calls. There are few defenses that attempt to mitigate TDoS attacks, most of them using IP filtering, with limited applicability. In our recent work, we proposed to use selective strategies for mitigating HTTP Application-Layer DDoS Attacks demonstrating their effectiveness in mitigating different types of attacks. This paper demonstrates that selective strategies can also be successfully used to mitigate TDoS attacks, in particular, two attacks: the Coordinated Call Attack and the Prank Call attack. We formalize a novel selective strategy for mitigating these attacks in the computational tool Maude and verify these defenses using the statistical model checker PVeStA. When compared to our experimental results (reported elsewhere), the results obtained by using formal methods were very similar. This demonstrate that formal methods is a powerful tool for specifying defenses for mitigating Distributed Denial of Service attacks allowing to increase our confidence on the proposed defense before actual implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    This can be easily done for many VoIP services.

  2. 2.

    Notice that although our experiments on the network were controlled experiments, they used off-the-shelf tools, such as Apache web-servers, which implement a number of optimizations, and our experiments suffered from interferences that cannot be controlled, such as network latency.

  3. 3.

    In fact, we omit some steps carried out by the server to find Bob in the network. This step can lead to DDoS amplification attacks [13] for which known solutions exists. Such amplification attacks are not, however, the main topic of this paper.

  4. 4.

    Or alternatively two honest users that have been infected to be zombies by some attacker.

  5. 5.

    The value of \(t_M\) can be obtained by the history of a VoIP provider’s usage.

  6. 6.

    We used a Poisson distribution because such distributions are normally used for modeling telephone calls arrival.

  7. 7.

    For the sake of presentation, we simplified here some aspects such as the use of the scheduler appearing in the complete model which can be found in [11].

  8. 8.

    Note that there is a value delay inserted when a message is sent in order to have a more realistic model.

References

  1. Cyber threat bulletin: boston hospital TDoS attack. http://voipsecurityblog.typepad.com/files/cyber-threat-bulletin-13-06-boston-hospital-telephony-denial-of-service-attack.pdf. Accessed 27 Sep 2015

  2. TDoS- extortionists jam phone lines of public services including hospitals. https://nakedsecurity.sophos.com/pt/2014/01/22/tdos-extortionists-jam-phone-lines-of-public-services-including-hospitals/. Accessed 27 Sep 2015

  3. Situational advisory: recent telephony denial of services (TDoS) attacks. http://voipsecurityblog.typepad.com/files/ky-fusion_tdos_3-29-13-2.pdf/. Accessed 27 Sep 2015

  4. Dantas, Y.G., Nigam, V., Fonseca, I.E.: A selective defense for application layer DDoS attacks. In: JISIC 2014, pp. 75–82 (2014)

    Google Scholar 

  5. The Surging Threat of Telephony Denial of Service Attacks. http://voipsecurityblog.typepad.com/files/tdos_paper_4-11-13.pdf. Accessed 28 Sep 2015

  6. TDoS extortionists jam phone lines of public services, including hospitals. https://nakedsecurity.sophos.com/2014/01/22/tdos-extortionists-jam-phone-lines-of-public-services-including-hospitals/. Accessed 28 Nov 2015

  7. Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutorials 15(4), 2046–2069 (2013)

    Article  Google Scholar 

  8. Sen, K., Viswanathan, M., Agha, G.: On statistical model checking of stochastic systems. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 266–280. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. AlTurki, M., Meseguer, J.: PVeStA: a parallel statistical model checking and quantitative analysis tool. In: Corradini, A., Klin, B., Cîrstea, C. (eds.) CALCO 2011. LNCS, vol. 6859, pp. 386–392. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  10. Lemos, M.O.O., Dantas, Y.G., Fonseca, I.E., Nigam, V.: A selective defense for mitigating coordinated call attacks (submitted)

    Google Scholar 

  11. ygdantas. Seven: repository (2013). https://github.com/ygdantas/SeVen.git

  12. SIP: Session initiation protocol. http://www.ietf.org/rfc/rfc3261.txt

  13. Shankesi, R., AlTurki, M., Sasse, R., Gunter, C.A., Meseguer, J.: Model-checking DoS amplification for VoIP session initiation. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 390–405. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  14. Khanna, S., Venkatesh, S.S., Fatemieh, O., Khan, F., Gunter, C.A.: Adaptive selective verification. In: INFOCOM, pp. 529–537 (2008)

    Google Scholar 

  15. Eckhardt, J., Mühlbauer, T., AlTurki, M., Meseguer, J., Wirsing, M.: Stable availability under denial of service attacks through formal patterns. In: de Lara, J., Zisman, A. (eds.) FASE 2012. LNCS, vol. 7212, pp. 78–93. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  16. Eckhardt, J., Mühlbauer, T., Meseguer, J., Wirsing, M.: Statistical model checking for composite actor systems. In: Martí-Oliet, N., Palomino, M. (eds.) WADT 2012. LNCS, vol. 7841, pp. 143–160. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  17. Agha, G., Meseguer, J., Sen, K.: PMaude: rewrite-based specification language for probabilistic object systems. Electron. Notes Theor. Comput. Sci. 153(2), 213–239 (2006)

    Article  Google Scholar 

  18. Clavel, M., Durán, F., Eker, S., Lincoln, P., Martí-Oliet, N., Meseguer, J., Talcott, C. (eds.): All About Maude. LNCS, vol. 4350. Springer, Heidelberg (2007)

    MATH  Google Scholar 

  19. Huici, F., Niccolini, S., D’Heureuse, N.: Protecting SIP against very large flooding DoS attacks. In: GLOBECOM 2009, pp. 1369–1374. IEEE Press, Piscataway (2009)

    Google Scholar 

  20. Yu-Sung, W., Bagchi, S., Garg, S., Singh, N., Tsai, T.: SCIDIVE: a stateful and cross protocol intrusion detection architecture for voice-over-IP environments. In: DSN 2004, p. 433. IEEE Computer Society, Washington, DC (2004)

    Google Scholar 

  21. Meadows, C.: A formal framework and evaluation method for network denial of service. In: CSFW, pp. 4–13 (1999)

    Google Scholar 

  22. Mahimkar, A., Shmatikov, V.: Game-based analysis of denial-of-service prevention protocols. In: CSFW, pp. 287–301 (2005)

    Google Scholar 

  23. AlTurki, M., Meseguer, J., Gunter, C.A.: Probabilistic modeling and analysis of DoS protection for the ASV protocol. Electr. Notes Theor. Comput. Sci. 234, 3–18 (2009)

    Article  Google Scholar 

  24. Henrique, J., Fonseca, I.E., Nigam, V.: Mitigating high-rate application layer DDoS attacks in software defined networks (submitted)

    Google Scholar 

Download references

Acknowledgments

This work was supported by the Hessian excellence initiative LOEWE at the Center for Advanced Security Research Darmstadt (CASED), by RNP, by Capes and CNPq.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuri Gil Dantas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Dantas, Y.G., Lemos, M.O.O., Fonseca, I.E., Nigam, V. (2016). Formal Specification and Verification of a Selective Defense for TDoS Attacks. In: Lucanu, D. (eds) Rewriting Logic and Its Applications. WRLA 2016. Lecture Notes in Computer Science(), vol 9942. Springer, Cham. https://doi.org/10.1007/978-3-319-44802-2_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44802-2_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44801-5

  • Online ISBN: 978-3-319-44802-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics