Back to Search
Start Over
The overlay scan attack: inferring topologies of distributed pub/sub systems through broker saturation
- Source :
- DEBS
- Publication Year :
- 2014
-
Abstract
- While pub/sub communication middleware has become main-stream in many application domains, little has been done to assess its weaknesses from a security standpoint. Complex attacks are usually planned by attackers by carefully analyzing the victim to identify those systems that, if successfully targeted, could provide the most effective result. In this paper we show that some pub/sub middleware are inherently vulnerable to a specific kind of preparatory attack, namely the Overlay Scan Attack, that a malicious user could exploit to infer the internal topology of a system, a sensible information that could be used to plan future attacks. The topology inference is performed by only using the standard primitives provided by the pub/sub middleware and assuming minimal knowledge on the target system. The practicality of this attack has been shown both in a simulated environment and through a test performed on a SIENA pub/sub deployment.
Details
- Language :
- English
- Database :
- OpenAIRE
- Journal :
- DEBS
- Accession number :
- edsair.doi.dedup.....2db78560c7eea4ba0b377bb00b7f3973