TY - JOUR
T1 - Denial of Firewalling Attacks (DoF)
T2 - The Case Study of the Emerging BlackNurse Attack
AU - Trabelsi, Zouheir
AU - Zeidan, Safaa
AU - Hayawi, Kadhim
N1 - Funding Information:
This work was supported by UAE University UPAR, under Grant 31T080.
Publisher Copyright:
© 2013 IEEE.
PY - 2019
Y1 - 2019
N2 - Traditional Distributed Denial of Service (DDoS) attacks usually flood network targets with malicious traffic. Recently, new types of DDoS attacks have emerged and target specifically network security devices, mainly firewalls and intrusion prevention systems (IPS). In contrast to traditional DDoS attacks, these emerging attacks use a low volume of malicious traffic. This paper is concerned solely with an emerging denial of firewalling attack (DoF), called the BlackNurse attack. The attack uses specially formatted ICMP error messages to overwhelm targeted firewalls' CPUs. This paper offers detailed insights into the understanding of DoF attacks and classifying them according to the targeted firewall resources, traffic volume, and attack effect. This paper also concentrates on the BlackNurse attack principles, practical attack generation, and its general effect on impacted firewalls and the networks. The performance evaluations are conducted on commercial grades, namely, Juniper NetScreen SSG 20 and Cisco ASA 5540 firewalls. The pros and cons of the available attack mitigations are discussed. OS screening features on Juniper NetScreen SSG 20 are used, for an example, to test their effectiveness in thwarting the attack. Furthermore, this paper proposes a novel mechanism to defend against the BlackNurse attack using an early rejection rule with dynamic activity time duration that depends on current and previous attack statistics and severity parameters. The evaluation is conducted to simulate the proposed mechanism defense against novice and expert BlackNurse attackers.
AB - Traditional Distributed Denial of Service (DDoS) attacks usually flood network targets with malicious traffic. Recently, new types of DDoS attacks have emerged and target specifically network security devices, mainly firewalls and intrusion prevention systems (IPS). In contrast to traditional DDoS attacks, these emerging attacks use a low volume of malicious traffic. This paper is concerned solely with an emerging denial of firewalling attack (DoF), called the BlackNurse attack. The attack uses specially formatted ICMP error messages to overwhelm targeted firewalls' CPUs. This paper offers detailed insights into the understanding of DoF attacks and classifying them according to the targeted firewall resources, traffic volume, and attack effect. This paper also concentrates on the BlackNurse attack principles, practical attack generation, and its general effect on impacted firewalls and the networks. The performance evaluations are conducted on commercial grades, namely, Juniper NetScreen SSG 20 and Cisco ASA 5540 firewalls. The pros and cons of the available attack mitigations are discussed. OS screening features on Juniper NetScreen SSG 20 are used, for an example, to test their effectiveness in thwarting the attack. Furthermore, this paper proposes a novel mechanism to defend against the BlackNurse attack using an early rejection rule with dynamic activity time duration that depends on current and previous attack statistics and severity parameters. The evaluation is conducted to simulate the proposed mechanism defense against novice and expert BlackNurse attackers.
KW - BlackNurse attack
KW - DDoS attack
KW - DoF attack
KW - session table ICMP error messages
KW - stateful firewall
UR - http://www.scopus.com/inward/record.url?scp=85066859644&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85066859644&partnerID=8YFLogxK
U2 - 10.1109/ACCESS.2019.2915792
DO - 10.1109/ACCESS.2019.2915792
M3 - Article
AN - SCOPUS:85066859644
SN - 2169-3536
VL - 7
SP - 61596
EP - 61609
JO - IEEE Access
JF - IEEE Access
M1 - 8710298
ER -