Denial of service attack on cuckoo filter based networking systems Articles uri icon

publication date

  • July 2020

start page

  • 1428

end page

  • 1432

issue

  • 7

volume

  • 24

International Standard Serial Number (ISSN)

  • 1089-7798

Electronic International Standard Serial Number (EISSN)

  • 1558-2558

abstract

  • Approximate membership check structures, such as Bloom filters or cuckoo filters, are widely used in Networking systems to speed up processing. Filters are beneficial as packets can be quickly examined to determine if further processing has to be done. This enables faster and more efficient processing that is needed to cope with the ever increasing traffic. Security is also becoming a critical issue for networked systems as we increasingly depend on them for most of our daily life tasks. Recently, the security of Bloom filters has been studied showing that depending on their implementation they may be vulnerable to attacks that degrade the false positive rate or that create false positives for certain elements. In this letter, the vulnerability of cuckoo filters is considered by first showing that an attacker can collapse the filter effectively disabling it by forcing insertion failures. This can be done with no knowledge of the implementation details. Then, in the second part of the letter, several techniques that could be used to mitigate such attacks are discussed.

keywords

  • denial of service; security; cuckoo filters