This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) This article relies excessively on references to primary sources. Please improve this article by adding secondary or tertiary sources. Find sources: "Slowdroid" – news · newspapers · books · scholar · JSTOR (July 2015) (Learn how and when to remove this template message) This article may rely excessively on sources too closely associated with the subject, potentially preventing the article from being verifiable and neutral. Please help improve it by replacing them with more appropriate citations to reliable, independent, third-party sources. (July 2015) (Learn how and when to remove this template message) (Learn how and when to remove this template message)
SlowDroid
Original author(s)Enrico Cambiaso, Maurizio Aiello
Developer(s)Enrico Cambiaso
Initial release2013
Preview release
0.87.5
Written inJava
Operating systemAndroid
Size128 kb
LicenseCreative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported
Websitewww.ieiit.cnr.it/expertise/network-security

SlowDroid is the first[1] denial of service attack which allows a single mobile device to take down a network server requiring minimal bandwidth.[2][3] The attack has been created for research purposes by Enrico Cambiaso and Maurizio Aiello for the IEIIT Institute[4] of the National Research Council of Italy and released as an Android application.

SlowDroid behavior[5] is similar to other Slow DoS Attacks[6] such as Slowloris, since it creates many connections with the victim in order to saturate the resources of the listening daemon application. One difference is on sent payload, which in case of SlowDroid is not compliant to a specific protocol: instead of sending a forged HTTP request, an endless sequence of spaces is sent instead. This characteristic makes SlowDroid able to target different protocols with the same payload. Another difference is on sending: during the data sending phase, instead of sending a sequence of characters as Slowloris does, SlowDroid sends a single character, hence reducing the bandwidth amounts. Finally, the main difference is on implementation: SlowDroid has been implemented to be executed on the Android mobile operating system platform.

SlowDroid was initially published on the Google Play Store. Due to developers terms of service, the application has been removed by the store.

SlowDroid can also be used as a botnet[7] and it was used also by the Anonymous[2] group of hacktivists.

SlowDroid was mentioned in an official European Commission document[7] and it was presented in scientific conferences.[8]

See also

References

  1. ^ Alturki, A. A. U. M. A., Vivek, T. B. K. M. K., & Talcott, N. A. S. C. (2019). Resource-Bounded Intruders in Denial of Service Attacks.
  2. ^ a b Cambiaso, Enrico; Papaleo, Gianluca; Aiello, Maurizio (2014). "SlowDroid: Turning a Smartphone into a Mobile Attack Vector". 2014 International Conference on Future Internet of Things and Cloud. pp. 405–410. doi:10.1109/FiCloud.2014.72. ISBN 978-1-4799-4357-9. S2CID 14792419.
  3. ^ Hirakawa, T., & Takata, T. (2020, August). The Trade-Off Between the False-Positive Ratio and the Attack Cost of Slow HTTP DoS. In International Conference on Network-Based Information Systems (pp. 225-237). Springer, Cham.
  4. ^ "IEIIT". CNR-IEIIT.
  5. ^ "Details of selected DDoS attacks" (PDF). Archived from the original (PDF) on 2021-11-18. Retrieved 2021-11-18.
  6. ^ Cambiaso, Enrico; Papaleo, Gianluca; Chiola, Giovanni; Aiello, Maurizio (2013). "Slow DoS attacks: definition and categorisation". International Journal of Trust Management in Computing and Communications. 1 (3/4): 300–319. doi:10.1504/IJTMCC.2013.056440. hdl:11567/571723.
  7. ^ a b "Integration results of SHIELD HW/SW modules". ec.europa.eu. Retrieved 2021-11-18.
  8. ^ "EECS 600 (Internet Security)". brennan.io. Retrieved 2021-11-18.