Software:Slowdroid

From HandWiki
Short description: Experimental denial of service attack
SlowDroid
SlowDroid app icon.png
SlowDroid main screen.png
Original author(s)Enrico Cambiaso, Maurizio Aiello
Developer(s)Enrico Cambiaso
Initial release2013
Preview release
0.87.5
Written inJava
Operating systemAndroid
Size128 kb
LicenseCreative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported
Websitewww.ieiit.cnr.it/expertise/network-security

SlowDroid is the first[1] denial of service attack which allows a single mobile device to take down a network server requiring minimal bandwidth.[2][3] The attack has been created for research purposes by Enrico Cambiaso and Maurizio Aiello for the IEIIT Institute[4] of the National Research Council of Italy and released as an Android application.

SlowDroid behavior[5] is similar to other Slow DoS Attacks[6] such as Slowloris, since it creates many connections with the victim in order to saturate the resources of the listening daemon application. One difference is on sent payload, which in case of SlowDroid is not compliant to a specific protocol: instead of sending a forged HTTP request, an endless sequence of spaces is sent instead. This characteristic makes SlowDroid able to target different protocols with the same payload. Another difference is on sending: during the data sending phase, instead of sending a sequence of characters as Slowloris does, SlowDroid sends a single character, hence reducing the bandwidth amounts. Finally, the main difference is on implementation: SlowDroid has been implemented to be executed on the Android mobile operating system platform.

SlowDroid was initially published on the Google Play Store. Due to developers terms of service, the application has been removed by the store.

SlowDroid can also be used as a botnet[7] and it was used also by the Anonymous[2] group of hacktivists.

SlowDroid was mentioned in an official European Commission document[7] and it was presented in scientific conferences.[8]

See also

References

  1. Alturki, A. A. U. M. A., Vivek, T. B. K. M. K., & Talcott, N. A. S. C. (2019). Resource-Bounded Intruders in Denial of Service Attacks.
  2. 2.0 2.1 Cambiaso, Enrico; Papaleo, Gianluca; Aiello, Maurizio (2014). "SlowDroid: Turning a Smartphone into a Mobile Attack Vector". 2014 International Conference on Future Internet of Things and Cloud. pp. 405–410. doi:10.1109/FiCloud.2014.72. ISBN 978-1-4799-4357-9. https://zenodo.org/record/896552. 
  3. Hirakawa, T., & Takata, T. (2020, August). The Trade-Off Between the False-Positive Ratio and the Attack Cost of Slow HTTP DoS. In International Conference on Network-Based Information Systems (pp. 225-237). Springer, Cham.
  4. "IEIIT". http://www.ieiit.cnr.it. 
  5. "Details of selected DDoS attacks". https://1vijz13l53qx3gxkg21xmwmw-wpengine.netdna-ssl.com/wp-content/uploads/DDoS-Attack-Details.pdf. 
  6. Cambiaso, Enrico; Papaleo, Gianluca; Chiola, Giovanni; Aiello, Maurizio (2013). "Slow DoS attacks: definition and categorisation". International Journal of Trust Management in Computing and Communications 1 (3/4): 300–319. doi:10.1504/IJTMCC.2013.056440. 
  7. 7.0 7.1 "Integration results of SHIELD HW/SW modules". https://ec.europa.eu/research/participants/documents/downloadPublic?documentIds=080166e5b82a6900&appId=PPGMS. 
  8. "EECS 600 (Internet Security)". https://brennan.io/notes/eecs600.html.