algorithmic complexity attack

An algorithmic complexity attack (ACA) is a form of attack in which an attacker sends a pattern of requests to a computer system that triggers the worst-case performance of the algorithms it uses. In turn, this may exhaust the resources the system uses.{{Cite journal |last=Crosby |first=Scott A. |last2=Wallach |first2=Dan S. |date=2003 |title=Denial of Service via Algorithmic Complexity Attacks |url=https://www.usenix.org/conference/12th-usenix-security-symposium/denial-service-algorithmic-complexity-attacks |journal=Proceedings of the 12th USENIX Security Symposium |language=en}} Examples of such attacks include ReDOS,{{Cite web |title=Regular expression Denial of Service - ReDoS {{!}} OWASP Foundation |url=https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS |access-date=2023-10-17 |website=owasp.org |language=en}} zip bombs and exponential entity expansion attacks.

References

{{Reflist}}

Related works

  • {{cite journal |last1=Grechishnikov |first1=E V |last2=Dobryshin |first2=M M |last3=Kochedykov |first3=S S |last4=Novoselcev |first4=V I |title=Algorithmic model of functioning of the system to detect and counter cyber attacks on virtual private network |journal=Journal of Physics: Conference Series |date=April 2019 |volume=1203 |issue=1 |pages=012064 |id={{ProQuest|2566108871}} |doi=10.1088/1742-6596/1203/1/012064 |bibcode=2019JPhCS1203a2064G |s2cid=149475216|doi-access=free }}
  • {{cite journal |last1=Afek |first1=Yehuda |last2=Bremler-Barr |first2=Anat |author-link2=Anat Bremler-Barr|last3=Harchol |first3=Yotam |last4=Hay |first4=David |last5=Koral |first5=Yaron |title=Making DPI Engines Resilient to Algorithmic Complexity Attacks |journal=IEEE/ACM Transactions on Networking |date=December 2016 |volume=24 |issue=6 |pages=3262–3275 |doi=10.1109/TNET.2016.2518712 |s2cid=14522075 }}
  • Vahidi, Ardalan. “Crowdsourcing Phase and Timing of Pre-Timed Traffic Signals in the Presence of Queues: Algorithms and Back-End System Architecture.” Ieeexplore, 1 Nov. 2019, https://ieeexplore.ieee.org/abstract/document/7323843.
  • Kiner, Emil, and Satya Konduru. “How Google Cloud Blocked the Largest Layer 7 DDoS Attack yet, 46 Million Rps.” Google Cloud Blog, 18 Aug. 2022, [https://cloud.google.com/blog/products/identity-security/how-google-cloud-blocked-largest-layer-7-ddos-attack-at-46-million-rps cloud.google.com/blog/products/identity-security/how-google-cloud-blocked-largest-layer-7-ddos-attack-at-46-million-rps].

{{computer-security-stub}}