Research

Low-rate DoS Attacks Using Signal Spoofing

My research focuses on Low-rate DoS (LDoS) attacks targeting TCP connections, which exploit the predictable nature of TCP retransmission timers. These attacks have emerged as a significant security challenge in modern networks.

While traditional LDoS attacks primarily use UDP traffic, I investigate TCP-based approaches that can evade protocol-based detection mechanisms. My work extends to Multipath TCP (MPTCP) environments, proposing distributed attack methods using multiple subflows.

Research Areas

Network Security

TCPใ‚’ๆจ™็š„ใจใ—ใŸๆœ€้ฉๅŒ–ใ—ใŸDoSๆ”ปๆ’ƒๆ‰‹ๆณ•ใฎ็ ”็ฉถ

Web Development

ใƒ•ใƒซใ‚นใ‚ฟใƒƒใ‚ฏ้–‹็™บ

Current Projects

TCP LDoS Attack Optimization

Optimizing ACK transmission rates in TCP-based LDoS attacks using Optimistic ACKing techniques

MPTCP Attack Implementation

Developing distributed LDoS attack methods in multipath TCP environments

Attack Detection Analysis

Analyzing the stealth properties of TCP-based LDoS attacks compared to traditional methods

Research Impact

My research demonstrates that TCP-based LDoS attacks can effectively suppress target traffic while maintaining lower detection profiles. I have developed optimization techniques for ACK transmission rates and proven the feasibility of distributed attacks using MPTCP's Data Sequence Signal manipulation.

Current work focuses on evaluating attack effectiveness in realistic network environments using mininet simulations, analyzing the impact of subflow numbers and path delay variations on attack performance.