The recently proposed Tuple Space Explosion (TSE)attack exploits an algorithmic deficiency in Open vSwitch (OVS) In TSE, legitimate low-rate attack traffic makes the cardinal linear search algorithm to spend an unaffordable time for classification each packet resulting in a denial-of-service (DoS) for the rest of the users . We show that TSE is still efficient in the newer version of OVS, we show that when the kernel datapath is compiled from a differentsource, it can degrade its performance to ~1% of its baseline with less than 1Mbps attack rate . We propose TSE 2.0 to defeat the ranking process and achieve a complete DoS against OVS-DPDK . Furthermore, we present TSE 1.1, which achieves the same goal against Ovs-DPSK running on multiple cores without significantly increasing the attack rate

Author(s) : Levente Csikor, Vipul Ujawane, Dinil Mon Divakaran

Links : PDF - Abstract

Code :

Keywords : attack - tse - ovs - rate - open -

Leave a Reply

Your email address will not be published. Required fields are marked *