Remote algorithmic complexity attacks against randomized hash tables

Noa Bar-Yosef*, Avishai Wool

*Corresponding author for this work

Research output: Contribution to conferencePaperpeer-review

Abstract

Many network devices, such as routers, firewalls, and intrusion detection systems, usually maintain per-connection state in a hash table. However, hash tables are susceptible to algorithmic complexity attacks, in which the attacker degenerates the hash into a simple linked list. A common counter-measure is to randomize the hash table by adding a secret value, known only to the device, as a parameter to the hash function. Our goal is to demonstrate how the attacker can defeat this protection: we demonstrate how to discover this secret value, and to do so remotely, using network traffic. We show that if the secret value is small enough, such an attack is possible. Our attack does not rely on any weakness of a particular hash function and can work against any hash although a poorly chosen hash function, that produces many collisions, can make the attack more efficient. We present a mathematical modeling of the attack, simulate the attack on different network topologies and finally describe a real-life attack against a weakened version of the Linux Netfilter.

Original languageEnglish
Pages117-124
Number of pages8
StatePublished - 2007
EventSECRYPT 2007 - International Conference on Security and Cryptography - Barcelona, Spain
Duration: 28 Jul 200731 Jul 2007

Conference

ConferenceSECRYPT 2007 - International Conference on Security and Cryptography
Country/TerritorySpain
CityBarcelona
Period28/07/0731/07/07

Keywords

  • Algorithmic complexity attack
  • Denial of service
  • Packet filter

Fingerprint

Dive into the research topics of 'Remote algorithmic complexity attacks against randomized hash tables'. Together they form a unique fingerprint.

Cite this