Slowdroid
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
|
Original author(s) | Enrico Cambiaso, Maurizio Aiello |
---|---|
Developer(s) | Enrico Cambiaso |
Initial release | 2013 |
Preview release | 0.87.5
|
Written in | Java |
Operating system | Android |
Size | 128 kb |
License | Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported |
Website | www |
SlowDroid is the first[1] denial of service attack which allows a single mobile device to take down a network server requiring minimal bandwidth.[2][3] The attack has been created for research purposes by Enrico Cambiaso and Maurizio Aiello for the IEIIT Institute[4] of the National Research Council of Italy and released as an Android application.
SlowDroid behavior[5] is similar to other Slow DoS Attacks[6] such as Slowloris, since it creates many connections with the victim in order to saturate the resources of the listening daemon application. One difference is on sent payload, which in case of SlowDroid is not compliant to a specific protocol: instead of sending a forged HTTP request, an endless sequence of spaces is sent instead. This characteristic makes SlowDroid able to target different protocols with the same payload. Another difference is on sending: during the data sending phase, instead of sending a sequence of characters as Slowloris does, SlowDroid sends a single character, hence reducing the bandwidth amounts. Finally, the main difference is on implementation: SlowDroid has been implemented to be executed on the Android mobile operating system platform.
SlowDroid was initially published on the Google Play Store. Due to developers terms of service, the application has been removed by the store.
SlowDroid can also be used as a botnet[7] and it was used also by the Anonymous[2] group of hacktivists.
SlowDroid was mentioned in an official European Commission document[7] and it was presented in scientific conferences.[8]
See also
[edit]- Slowloris (computer security)
- Trinoo
- Stacheldraht
- Denial of service
- LAND
- Low Orbit Ion Cannon
- High Orbit Ion Cannon
References
[edit]- ^ Alturki, A. A. U. M. A., Vivek, T. B. K. M. K., & Talcott, N. A. S. C. (2019). Resource-Bounded Intruders in Denial of Service Attacks.
- ^ a b Cambiaso, Enrico; Papaleo, Gianluca; Aiello, Maurizio (2014). "SlowDroid: Turning a Smartphone into a Mobile Attack Vector". 2014 International Conference on Future Internet of Things and Cloud. pp. 405–410. doi:10.1109/FiCloud.2014.72. ISBN 978-1-4799-4357-9. S2CID 14792419.
- ^ Hirakawa, T., & Takata, T. (2020, August). The Trade-Off Between the False-Positive Ratio and the Attack Cost of Slow HTTP DoS. In International Conference on Network-Based Information Systems (pp. 225-237). Springer, Cham.
- ^ "IEIIT". CNR-IEIIT.
- ^ "Details of selected DDoS attacks" (PDF). Archived from the original (PDF) on 2021-11-18. Retrieved 2021-11-18.
- ^ Cambiaso, Enrico; Papaleo, Gianluca; Chiola, Giovanni; Aiello, Maurizio (2013). "Slow DoS attacks: definition and categorisation". International Journal of Trust Management in Computing and Communications. 1 (3/4): 300–319. doi:10.1504/IJTMCC.2013.056440. hdl:11567/571723.
- ^ a b "Integration results of SHIELD HW/SW modules". ec.europa.eu. Retrieved 2021-11-18.
- ^ "EECS 600 (Internet Security)". brennan.io. Retrieved 2021-11-18.