Research
Low-rate DoS Attacks Using Signal Spoofing
My research focuses on Low-rate DoS (LDoS) attacks targeting TCP connections, which exploit the predictable nature of TCP retransmission timers. These attacks have emerged as a significant security challenge in modern networks.
While traditional LDoS attacks primarily use UDP traffic, I investigate TCP-based approaches that can evade protocol-based detection mechanisms. My work extends to Multipath TCP (MPTCP) environments, proposing distributed attack methods using multiple subflows.
Research Areas
Network Security
TCPใๆจ็ใจใใๆ้ฉๅใใDoSๆปๆๆๆณใฎ็ ็ฉถ
Web Development
ใใซในใฟใใฏ้็บ
Current Projects
TCP LDoS Attack Optimization
Optimizing ACK transmission rates in TCP-based LDoS attacks using Optimistic ACKing techniques
MPTCP Attack Implementation
Developing distributed LDoS attack methods in multipath TCP environments
Attack Detection Analysis
Analyzing the stealth properties of TCP-based LDoS attacks compared to traditional methods
Research Impact
My research demonstrates that TCP-based LDoS attacks can effectively suppress target traffic while maintaining lower detection profiles. I have developed optimization techniques for ACK transmission rates and proven the feasibility of distributed attacks using MPTCP's Data Sequence Signal manipulation.
Current work focuses on evaluating attack effectiveness in realistic network environments using mininet simulations, analyzing the impact of subflow numbers and path delay variations on attack performance.