Back to Search Start Over

The overlay scan attack: inferring topologies of distributed pub/sub systems through broker saturation

Authors :
Roberto Baldoni
Francesco Frontali
Leonardo Aniello
Leonardo Querzoni
Giuseppe Antonio Di Luna
Claudio Ciccotelli
Source :
DEBS
Publication Year :
2014

Abstract

While pub/sub communication middleware has become main-stream in many application domains, little has been done to assess its weaknesses from a security standpoint. Complex attacks are usually planned by attackers by carefully analyzing the victim to identify those systems that, if successfully targeted, could provide the most effective result. In this paper we show that some pub/sub middleware are inherently vulnerable to a specific kind of preparatory attack, namely the Overlay Scan Attack, that a malicious user could exploit to infer the internal topology of a system, a sensible information that could be used to plan future attacks. The topology inference is performed by only using the standard primitives provided by the pub/sub middleware and assuming minimal knowledge on the target system. The practicality of this attack has been shown both in a simulated environment and through a test performed on a SIENA pub/sub deployment.

Details

Language :
English
Database :
OpenAIRE
Journal :
DEBS
Accession number :
edsair.doi.dedup.....2db78560c7eea4ba0b377bb00b7f3973