Skip to main content

On the Security and Vulnerability of PING

  • Conference paper
  • First Online:
Self-Stabilizing Systems (WSS 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2194))

Included in the following conference series:

Abstract

We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is secure against weak adversaries (and insecure against strong ones). We then argue that despite the security of PING against weak adversaries, the natural vulnerability of this protocol (or of any other protocol for that matter) can be exploited by a weak adversary to launch a denial of service attack against any computer that hosts the protocol. Finally, we discuss three mechanisms, namely ingress filtering, hop integrity, and soft firewalls that can be used to prevent denial of service attacks in the Internet.

This work is supported in part by DARPA contract F33615-01-C-1901.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Arora, A., Gouda, M.G.: Closure and convergence: A foundation for fault-tolerant computing. IEEE Transactions on Software Engineering, Vol. 19, No. 3 (1993) 1015–1027

    Article  Google Scholar 

  2. Cheswick, W.R., Bellovin, S.M.: Firewalls and Internet Security. 1st edn. Addison-Wesley Publishing Co., Reading, Massachusetts (1994)

    MATH  Google Scholar 

  3. CERT Advisory: Smurf IP Denial-of-Service Attacks. CERT Advisory CA-1998-01, http://www.cert.org/ (1998)

  4. Ferguson, P., Senie, D.: Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2267 (1998)

    Google Scholar 

  5. Dolev, S.: Self-Stabilization. 1st edn. MIT Press, Cambridge Massachusetts (2000)

    MATH  Google Scholar 

  6. Gouda, M.G.: Elements of Network Protocol Design. 1st edn. John Wiley & Sons, New York, New York (1998)

    Google Scholar 

  7. Gouda, M.G.: Elements of security: Closure, convergence, and protection. Information Processing Letters, Vol. 77, Nos. 2-4 (2001) 109–114

    Article  MATH  MathSciNet  Google Scholar 

  8. Gouda, M.G., Elnozahy, E.N., Huang, C.-T., McGuire, T.M.: Hop Integrity in Computer Networks. Proceedings of the 8th IEEE International Conference on Network Protocols (2000) 3–11

    Google Scholar 

  9. Postel, J.: Internet Control Message Protocol. RFC 792 (1981)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gouda, M.G., Huang, CT., Arora, A. (2001). On the Security and Vulnerability of PING. In: Datta, A.K., Herman, T. (eds) Self-Stabilizing Systems. WSS 2001. Lecture Notes in Computer Science, vol 2194. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45438-1_9

Download citation

  • DOI: https://doi.org/10.1007/3-540-45438-1_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42653-0

  • Online ISBN: 978-3-540-45438-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics