Jump to content

Packet drop attack

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by XLinkBot (talk | contribs) at 14:25, 20 October 2015 (BOT--Reverting link addition(s) by 117.204.170.169 to revision 679005747 (https://www.youtube.com/edit?o=U&video_id=Yig6FRrVL7U [\byoutube\.com])). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

In computer networking, a packet drop attack or blackhole attack is a type of denial-of-service attack in which a router that is supposed to relay packets instead discards them. This usually occurs from a router becoming compromised from a number of different causes. One cause mentioned in research is through a denial-of-service attack on the router using a known DDoS tool.[1] Because packets are routinely dropped from a lossy network, the packet drop attack is very hard to detect and prevent.

The malicious router can also accomplish this attack selectively, e.g. by dropping packets for a particular network destination, at a certain time of the day, a packet every n packets or every t seconds, or a randomly selected portion of the packets. This is rather called a gray hole attack. If the malicious router attempts to drop all packets that come in, the attack can actually be discovered fairly quickly through common networking tools such as traceroute. Also, when other routers notice that the compromised router is dropping all traffic, they will generally begin to remove that router from their forwarding tables and eventually no traffic will flow to the attack. However, if the malicious router begins dropping packets on a specific time period or over every n packets, it is often harder to detect because some traffic still flows across the network.[1]

The packet drop attack can be frequently deployed to attack wireless ad hoc networks. Because wireless networks have a much different architecture than that of a typical wired network, a host can broadcast that it has the shortest path towards a destination. By doing this, all traffic will be directed to the host that has been compromised, and the host is able to drop packets at will.[2] Also over a mobile ad hoc network, hosts are specifically vulnerable to collaborative attacks where multiple hosts will become compromised and deceive the other hosts on the network.[3]

See also

References

  1. ^ a b Zhang, Xiaobing; et al. (2000). "Malicious packet dropping: how it might impact the TCP performance and how we can detect it" (PDF). icmp: 263.
  2. ^ Al-Shurman, Mohammad; et al. "Black Hole Attack in Mobile Ad Hoc Networks" (PDF).
  3. ^ Wang, Weichao. "Defending against Collaborative Packet Drop Attacks on MANETs" (PDF). Retrieved 2011-05-05.