Главная
Study mode:
on
1
USENIX Security '24 - Loopy Hell(ow): Infinite Traffic Loops at the Application Layer
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore a 10-minute conference presentation from USENIX Security '24 examining the critical threat of application-layer traffic loops in network security. Discover how researchers from CISPA Helmholtz Center for Information Security investigate a cost-effective alternative to traditional Denial-of-Service (DoS) attacks through infinite traffic loops between servers. Learn about their systematic approach to identifying vulnerable server pairs, where a single IP-spoofed trigger packet can initiate endless error message exchanges. Understand their findings from analyzing both popular protocols (DNS, NTP, TFTP) and legacy UDP protocols, revealing approximately 296,000 vulnerable servers in IPv4 that could potentially form billions of exploitable loop pairs.

Infinite Traffic Loops at the Application Layer - A Study of DoS Attack Primitives

USENIX
Add to list