Close Menu
5gantennas.org5gantennas.org
  • Home
  • 5G
    • 5G Technology
  • 6G
  • AI
  • Data
    • Global 5G
  • Internet
  • WIFI
  • 5G Antennas
  • Legacy

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
5gantennas.org5gantennas.org
  • Home
  • 5G
    1. 5G Technology
    2. View All

    Deutsche Telekom to operate 12,500 5G antennas over 3.6 GHz band

    August 28, 2024

    URCA Releases Draft “Roadmap” for 5G Rollout in the Bahamas – Eye Witness News

    August 23, 2024

    Smart Launches Smart ZTE Blade A75 5G » YugaTech

    August 22, 2024

    5G Drone Integration Denmark – DRONELIFE

    August 21, 2024

    Hughes praises successful private 5G demo for U.S. Navy

    August 29, 2024

    GSA survey reveals 5G FWA has become “mainstream”

    August 29, 2024

    China Mobile expands 5G Advanced, Chunghwa Telecom enters Europe

    August 29, 2024

    Ateme and ORS Boost 5G Broadcast Capacity with “World’s First Trial of IP-Based Statmux over 5G Broadcast” | TV Tech

    August 29, 2024
  • 6G

    India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

    August 29, 2024

    Vodafonewatch Weekly: Rural 4G, Industrial 5G, 6G Patents | Weekly Briefing

    August 29, 2024

    Southeast Asia steps up efforts to build 6G standards

    August 29, 2024

    Energy efficiency as an inherent attribute of 6G networks

    August 29, 2024

    Finnish working group launches push for 6G technology

    August 28, 2024
  • AI

    Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

    August 29, 2024

    Why Honeywell is betting big on Gen AI

    August 29, 2024

    Ethically questionable or creative genius? How artists are engaging with AI in their work | Art and Design

    August 29, 2024

    “Elon Musk and Trump” arrested for burglary in disturbing AI video

    August 29, 2024

    Nvidia CFO says ‘enterprise AI wave’ has begun and Fortune 100 companies are leading the way

    August 29, 2024
  • Data
    1. Global 5G
    2. View All

    Global 5G Enterprise Market is expected to be valued at USD 34.4 Billion by 2032

    August 12, 2024

    Counterpoint predicts 5G will dominate the smartphone market in early 2024

    August 5, 2024

    Qualcomm’s new chipsets will power affordable 5G smartphones

    July 31, 2024

    Best Super Fast Download Companies — TradingView

    July 31, 2024

    Crypto Markets Rise on Strong US Economic Data

    August 29, 2024

    Microsoft approves construction of third section of Mount Pleasant data center campus

    August 29, 2024

    China has invested $6.1 billion in state-run data center projects over two years, with the “East Data, West Computing” initiative aimed at capitalizing on the country’s untapped land.

    August 29, 2024

    What is the size of the clinical data analysis solutions market?

    August 29, 2024
  • Internet

    NATO believes Russia poses a threat to Western internet and GPS services

    August 29, 2024

    Mpeppe grows fast, building traction among Internet computer owners

    August 29, 2024

    Internet Computer Whale Buys Mpeppe (MPEPE) at 340x ROI

    August 29, 2024

    Long-term internet computer investor adds PEPE rival to holdings

    August 29, 2024

    Biden-Harris Administration Approves Initial Internet for All Proposals in Mississippi and South Dakota

    August 29, 2024
  • WIFI

    4 Best Wi-Fi Mesh Networking Systems in 2024

    September 6, 2024

    Best WiFi deal: Save $200 on the Starlink Standard Kit AX

    August 29, 2024

    Sonos Roam 2 review | Good Housekeeping UK

    August 29, 2024

    Popular WiFi extender that eliminates dead zones in your home costs just $12

    August 29, 2024

    North American WiFi 6 Mesh Router Market Size, Share, Forecast, [2030] – அக்னி செய்திகள்

    August 29, 2024
  • 5G Antennas

    Nokia and Claro bring 5G to Argentina

    August 27, 2024

    Nokia expands FWA portfolio with new 5G devices – SatNews

    July 25, 2024

    Deutsche Telekom to operate 12,150 5G antennas over 3.6 GHz band

    July 24, 2024

    Vodafone and Ericsson develop a compact 5G antenna in Germany

    July 12, 2024

    Vodafone and Ericsson unveil new small antennas to power Germany’s 5G network

    July 11, 2024
  • Legacy
5gantennas.org5gantennas.org
Home»Internet»300,000 internet hosts at risk of ‘catastrophic’ loop DoS attack
Internet

300,000 internet hosts at risk of ‘catastrophic’ loop DoS attack

5gantennas.orgBy 5gantennas.orgMarch 21, 2024No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


A newly discovered type of self-persistent denial of service (DoS) attack targeting application-layer messages could compromise 300,000 Internet hosts and could be difficult to stop once underway This was discovered by researchers.

CISPA Helmholtz Center for Information Security researcher Yepeng Pan and Professor Christian Rossow detected an attack, is called “loop DoS”. According to one report, this involves pairing two network services “in such a way that they continue to respond to each other’s messages ad infinitum,” creating a kind of infinite response loop. Post on the CISPA website Describe the attack.

This dynamic generates a large amount of traffic, resulting in a DoS to the systems and networks involved. Additionally, researchers say that once the loop is in motion, even the attacker cannot stop the attack, and even a single spoofable host could trigger an attack.

The attack exploits a new traffic loop vulnerability in certain User Datagram Protocol (UDP)-based applications, according to a post from Carnegie Mellon University’s CERT Coordination Center.unauthenticated attacker May use maliciously crafted packets Vulnerable UDP-based implementations of various application protocols such as DNS, NTP, and TFTP, leading to DoS and resource exploitation.

In addition to these programs, researchers also discovered flaws in traditional protocols such as Daytime, Time, Active Users, Echo, Chargen, and QOTD. According to CISPA, these are all “widely used to provide basic functionality on the Internet.” post.

Loop DoS is a “nasty” type of cyber attack

Researchers believe this attack is comparable to an amplification attack in terms of the amount of traffic it can cause, but there are two key differences. One is that the attacker does not need to continuously send attack traffic through looping behavior unless the defender terminates the loop and shuts down the self-repeating nature of the attack. Another is that without proper protection, DoS attacks can continue for some time.

surely, DoS attack Resource consumption in the web architecture is most often an issue, but until now it has been very difficult to take web properties completely offline using this type of attack. Because “the victim’s web architecture all at once,” explains Jason Kent, resident hacker at Cequence Security.

loop DoS The attack is game-changing because the calls can originate from within the architecture itself and then multiply exponentially, he explained.

“You can give Server A the address of Server B in your organization and pretend you’re Server B,” says Kent. “Server A sends errors to server B, and server B sends errors to server A indefinitely or until one of them stops.”

This eliminates the need for attackers to plan and strategize how to obtain millions of hosts, potentially causing cascading system failures that are externally triggered and creep throughout the environment. ” and considers loop DoS attacks to be “a nuisance.”

Four DoS attack scenarios

The researchers provided four different attack scenarios to demonstrate how a loop DoS attack works. In the simplest scenario, an attacker could overload the vulnerable server itself, creating numerous loops with other “loop” servers to focus on a single target, her server. . This results in the host’s bandwidth or computational resources being exhausted.defender can please stop this attack Patch loop servers to avoid loop patterns.

In the second scenario, an attacker targets the backbone of a network that contains a large number of loop hosts and pairs these hosts with each other to create thousands to millions of loops within the target network. . To prevent such attacks from external hosts, networks can deploy IP spoofed traffic, researchers say.

The third attack is one in which an attacker pairs loop servers in a way that congests individual Internet links. “In the simplest case, this could be the uplink of the target network,” the researchers wrote, adding that this could be done on any Internet link that the loop pair intersects.

“To this end, the attacker combines inner loop hosts with outer loop hosts. This stresses the target network’s Internet uplink with loop traffic,” the researchers explained.

The fourth rare attack scenario is also the most “catastrophic type,” where the looping server sends back multiple responses instead of a single response, resulting in “a self-amplifying loop that not only continues forever, but also intensifies.” allows for the creation of “The problem lies in the loop frequency,” the researchers wrote. He added that the attack would continue even if the defender experienced packet loss, unless he dropped all network traffic.

Loop DoS attack mitigation and prevention

In addition to the specific mitigations already outlined for various looping DoS attack scenarios, there are other ways to mitigate or stop such attacks once they have started. This is good news for countless users. vulnerable host serverBecause it “doesn’t seem practical to fix them all at once,” the researchers acknowledged.

Blocking UDP and moving to TCP-based communication with authentication and monitoring can reduce vulnerability to loop DoS attacks, Kent says. However, if this is not possible, he added, system administrators “may wish to restrict host-to-host communication on internal firewalls or network equipment.”

Other mitigations suggested by the researchers include updating or shutting down services vulnerable to loop DoS attacks. Restrict service access to clients with ephemeral source ports or client source ports. Identify vulnerable software or products in your network and notify product vendors of potential exploits.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleLeadership lessons on implementing novel technologies
Next Article 5G subscribers in India use 3.6x more data than 4G users: Nokia
5gantennas.org
  • Website

Related Posts

NATO believes Russia poses a threat to Western internet and GPS services

August 29, 2024

Mpeppe grows fast, building traction among Internet computer owners

August 29, 2024

Internet Computer Whale Buys Mpeppe (MPEPE) at 340x ROI

August 29, 2024
Leave A Reply Cancel Reply

You must be logged in to post a comment.

Latest Posts

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024

Crypto Markets Rise on Strong US Economic Data

August 29, 2024
Don't Miss

Business News | Communications Minister Scindia promotes 6G leadership and nationwide broadband in meeting with telecom operators

By 5gantennas.orgAugust 24, 2024

New Delhi [India]August 24 (ANI): Union Telecom Minister Jyotiraditya Scindia along with Minister of State…

SingTel and SK Telecom prepare for the 6G future

July 8, 2024

Apple focuses on 6G for future iPhones

December 11, 2023

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to 5GAntennas.org, your reliable source for comprehensive information on 5G technology, artificial intelligence (AI), and data-related advancements. We are passionate about staying at the forefront of these cutting-edge fields and bringing you the latest insights, trends, and developments.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Most Popular

Will 5G make 2024 the most connected year in the industry?

December 1, 2023

The current state of 5G in the US and how it can improve

September 28, 2023

How 5G technology will transform gaming on the go

January 31, 2024
© 2025 5gantennas. Designed by 5gantennas.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • About Creator

Type above and press Enter to search. Press Esc to cancel.