TY - GEN
T1 - Exception triggered DoS attacks on wireless networks
AU - Zhao, Yao
AU - Vemuri, Sagar
AU - Chen, Jiazhen
AU - Chen, Yan
AU - Zhou, Hai
AU - Fu, Zhi
PY - 2009
Y1 - 2009
N2 - Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through experiments, we show that even the latest strongly authenticated protocols such as PEAP, EAP-TLS and EAP-TTLS are vulnerable to these attacks. Real attacks have been implemented and tested against TLS-based EAP protocols, the major family of security protocols for Wireless LAN, as well as the Return Routability of Mobile IPv6, an emerging lightweight security protocol in new IPv6 infrastructure. DoS attacks on PEAP, one popular TLS-based EAP protocol were performed and tested on a major university's wireless network, and the attacks were highly successful. We further tested the scalability of our attack through a series of ns-2 simulations. Countermeasures for detection of such attacks and improvements of the protocols to overcome these types of DoS attacks are also proposed and verified experimentally.
AB - Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through experiments, we show that even the latest strongly authenticated protocols such as PEAP, EAP-TLS and EAP-TTLS are vulnerable to these attacks. Real attacks have been implemented and tested against TLS-based EAP protocols, the major family of security protocols for Wireless LAN, as well as the Return Routability of Mobile IPv6, an emerging lightweight security protocol in new IPv6 infrastructure. DoS attacks on PEAP, one popular TLS-based EAP protocol were performed and tested on a major university's wireless network, and the attacks were highly successful. We further tested the scalability of our attack through a series of ns-2 simulations. Countermeasures for detection of such attacks and improvements of the protocols to overcome these types of DoS attacks are also proposed and verified experimentally.
UR - http://www.scopus.com/inward/record.url?scp=70449878083&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70449878083&partnerID=8YFLogxK
U2 - 10.1109/DSN.2009.5270358
DO - 10.1109/DSN.2009.5270358
M3 - Conference contribution
AN - SCOPUS:70449878083
SN - 9781424444212
T3 - Proceedings of the International Conference on Dependable Systems and Networks
SP - 13
EP - 22
BT - Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2009
T2 - 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2009
Y2 - 29 June 2009 through 2 July 2009
ER -