by V Anil Kumar and Debabrata Das
Multipath Transmission Control Protocol (MPTCP) is an innovative next-generation transport protocol standardized by the Internet Engineering Task Force (IETF) to overcome the single path limitation of the Transmission Control Protocol (TCP). MPTCP augments TCP with a new set of signaling options for seamless transmission and reception of application data across multiple interlinked TCP connections called subflows. In this paper, we focus on a new security concern associated with the signal exchanging process of MPTCP. To the best of our knowledge, for the first time, this paper exposes that MPTCP signal exchange scheme is vulnerable to a sophisticated packet spoofing technique, which we name as Data Sequence Signal (DSS) manipulation. We implement the vulnerability, create attack scenarios in Linux Kernel and conduct experiments over emulated testbed to demonstrate the existence of the vulnerability and means of exploiting it for powerful attacks. Our results show that DSS manipulation can be tactically exploited, on top of TCP optimistic ACKing, to generate non-responsive traffic like Denial-of-Service (DoS) attack flood. Particularly, we demonstrate two new adverse scenarios, where a MPTCP sender is forced to: (a) transmit at a rate significantly higher than the bottleneck link bandwidth, and (b) induce high intensity and harmful packet bursts at line-rate called Maliciously-induced-Bursts (MiBs). We also show that the non-responsive traffic resulting from the attack can suppress genuine congestion controlled traffic to the extent of causing DoS attack. We capture and analyze the dynamics of important MPTCP parameters, like send buffer occupancy of meta and subflow sockets, congestion window and flightsize to highlight the attack impact. DSS manipulation originates from a fundamental protocol design limitation rather than from any implementation flaw. We also propose a novel technique called data sequence map skipping for detection and countermeasure against DSS manipulation based attacks.
by K.Silpa and Anil Earnest
Kinematic source process models using tele-seismic waveform inversion of three stable continental region (SCR) earthquakes from India (1993 Mw 6.2 Latur, 1997 Mw 5.8 Jabalpur and 2001 Mw 7.6 Bhuj) are presented in this paper to demonstrate the slip evolution and stress drop. These finite-fault models are methodologically unique to constrain the source dimensions, compared with assumptions and quasi-observations around blind faults. Our results show that these events do have a compact zone of singular asperity breakage within the Indian crust. Whereas the Bhuj and Jabalpur events have their rupture majorly restricted within the lower crustal regions. The Latur event ruptured a very shallow crustal asperity. The estimated rupture velocities are in the range of 2.6–3.2 km/s, Bhuj event the slowest and lengthiest. Our results do not favour an updip shallow component of asperity breakage for the Bhuj earthquake, as evident from lack of surface ruptures. Study also indicates that the 1993 Latur event occurred on a fault with high stress concentration which indicates stronger fault asperities or slip within a newer fault. Models on 1997 Jabalpur event imply higher frictional strength and very brittle nature at the lower crustal regions of the Indian slab, indicating a mechanically very strong lower crust. We conclude that an event like Latur can occur anywhere within continental interiors of Indian SCR, or elsewhere globally, and is an underestimated seismic hazard.