DoSat: A DDoS Attack on the Vulnerable Time-Varying Topology of LEO Satellite Networks

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Low Earth orbit (LEO) satellite networks, which feature low-latency and full-coverage connectivity, promise to revolutionize the Internet and become an indispensable part of the next-generation communications network. However, due to the limited bandwidth and processing resources available on board, LEO satellite networks are susceptible to network attacks, especially link flooding attacks (LFAs). LFAs are a specific type of the notorious DoS attack where the attacker tries to cut off critical network links using seemingly legitimate traffic. Unlike attacks targeted directly on servers, LFAs undermine networks in a more insidious manner. In this paper, we present DoSat (DDoS on Satellites), an LFA attack model that focuses on the time-varying topology of satellite networks. The model takes advantage of such an opportunity to concentrate attack traffic: the traffic having been sent out during the process of path delay switching will reach the destination in tandem. We demonstrate through simulation experiments that DoSat can reduce the cost of LFAs by approximately 20% without any tradeoffs of attack’s undetectability.

Cite

CITATION STYLE

APA

Lu, T., Ding, X., Shang, J., Zhao, P., & Zhang, H. (2024). DoSat: A DDoS Attack on the Vulnerable Time-Varying Topology of LEO Satellite Networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 14584 LNCS, pp. 265–282). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-54773-7_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free