Next Article in Journal
Silicon-on-Insulator Optical Buffer Based on Magneto-Optical 1 × 3 Micro-Rings Array Coupled Sagnac Ring
Next Article in Special Issue
One-Pixel Attack for Continuous-Variable Quantum Key Distribution Systems
Previous Article in Journal
Characteristic Study of Non-Line-of-Sight Scattering Ultraviolet Communication System at Small Elevation Angle
Previous Article in Special Issue
Weak Randomness Analysis of Measurement-Device-Independent Quantum Key Distribution with Finite Resources
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Low-Rate Denial-of-Service Attack Detection: Defense Strategy Based on Spectral Estimation for CV-QKD

1
School of Automation, Central South University, Changsha 410083, China
2
School of Computer Science and Engineering, Central South University, Changsha 410083, China
*
Author to whom correspondence should be addressed.
Photonics 2022, 9(6), 365; https://doi.org/10.3390/photonics9060365
Submission received: 10 April 2022 / Revised: 13 May 2022 / Accepted: 17 May 2022 / Published: 24 May 2022
(This article belongs to the Special Issue Recent Progress on Quantum Cryptography)

Abstract

:
Although continuous-variable quantum key distribution (CVQKD) systems have unconditional security in theory, there are still many cyber attacking strategies proposed that exploit the loopholes of hardware devices and algorithms. At present, few studies have focused on attacks using algorithm vulnerabilities. The low-rate denial-of-service (LDoS) attack is precisely an algorithm-loophole based hacking strategy, which attacks by manipulating a channel’s transmittance T. In this paper, we take advantage of the feature that the power spectral density (PSD) of LDoS attacks in low frequency band is higher than normal traffic’s to detect whether there are LDoS attacks. We put forward a detection method based on the Bartlett spectral estimation approach and discuss its feasibility from two aspects, the estimation consistency and the detection accuracy. Our experiment results demonstrate that the method can effectively detect LDoS attacks and maintain the consistency of estimation. In addition, compared with the traditional method based on the wavelet transform and Hurst index estimations, our method has higher detection accuracy and stronger pertinence. We anticipate our method may provide an insight into how to detect an LDoS attack in a CVQKD system.

1. Introduction

Humans have been giving great importance to cryptography since ancient times. With the development of computer technology, a massive amount of sensitive data called for more advanced encryption techniques to ensure security. Key distribution is the crucial issue of encryption techniques, and there have been many key distribution methods, such as RSA algorithms [1] of asymmetric encryption. However, all classical encryption techniques based on high computational complexity are decipherable and are unable to detect the disclosure of keys [2]. Thankfully, the progress of quantum key distribution (QKD) makes it possible for two remote communicating parties to share secure keys through an unsafe quantum channel controlled by an eavesdropper [3,4], since the Heisenberg uncertainty principle [5] and no-cloning theorem [6] of quantum mechanics guarantee QKD’s unconditional information security and the detectability of eavesdroppers. Compared with discrete-variable (DV)QKD, continuous-variable (CV)QKD has the merits of low-cost implementation for it is compatible with the current telecom networks and components such as homodyne and heterodyne detectors and has other advantages [7,8]. Specifically, the Gaussian-modulated coherent state (GMCS) protocol, the most developed CVQKD protocol, has been proven secure against collective attacks and coherent attacks theoratically [9,10,11,12,13].
By contrast, the imperfection of hardware devices and algorithms lead to security loopholes in CVQKD systems.
A great deal of research has put forward various practical attack strategies by exploiting hardware defects, and examples include the wavelength attack, the calibration attack, the local oscillator (LO) fluctuation attack and the saturation attack [14,15,16,17,18]. P. Huang et al. proposed an asynchronous countermeasure strategy without structural modifications of the conventional CVQKD scheme to defend against the above-mentioned attacks [19]. In stark contrast, there are few studies on the practical security analysis of the algorithms. Y. Li et al. proposed a denial-of-service (DoS) attack strategy aimed at the parameter estimation method in the communication process [20]. Under the DoS attack, eavesdroppers’ slight manipulation of the channel transmittance results in great underestimation of the secure transmittance distance, and subsequently the two sides of communication consider the channel insecure and thus terminate the communication process.
The low-rate denial-of-service (LDoS) attack is a more stealthy type of DoS attacks because it sends short-time but high-rate burst attack traffic periodically to maintain the average attack rate low, so as to escape from detection [21]. The LDoS attack, in the narrow sense, is TCP protocol oriented, while in GMCS protocol, the LDoS attack can be considered as short-time, high-rate and periodic burst attack on the parameter estimation. According to the periodicity of LDoS attacks and the characteristic differences between periodic signals and aperiodic signals in the frequency domain, the rule that the power spectral density (PSD) of the LDoS attack traffic in low frequency band is higher than normal is then obtained [22]. On the basis of this rule, the issue of LDoS attacks detection transforms into the spectral estimation of the stochastic sequence.
In this paper, to detect LDoS attacks and guarantee the consistency of spectral estimation, we proposed a detection method based on Bartlett’s spectral estimation approach (average periodogram). Spectral estimation is the issue of estimating the power spectrum of a stochastic process given partial data, usually only a finite number of samples of the autocorrelation function [23]. It detects whether the network traffic contains LDoS attack traffic by estimating the power spectral density in low frequency band. There are two broad categories of approaches in spectral estimation, the classical approaches (non-parametric approaches) and the modern approaches (parametric model-based approaches). The former consists mainly of the periodogram and its improved approaches, including data windowed periodogram, average periodogram, etc., and the typical models of the latter are autoregressive (AR), moving average (MA) and autoregressive moving average (ARMA) models [24,25,26]. The structure of the paper is as follows. Firstly, the strategy of LDoS attacks based on the GMCS protocol is briefly introduced. Secondly, we discuss three different spectral estimation approaches, autocorrelation estimation with rectangular window, periodogram with Bartlett window and the Bartlett approach (average periodogram), and then analyze their estimation results. Finally, we carry out the related experiences and it is demonstrated that the proposed method can effectively detect LDoS attacks.

2. System Description and Attack Detection

2.1. Attack Strategy against GMCS Protocol

In the GMCS protocol, Alice sends Bob a chain of coherent states | x + i p where the quadratures (x, p) are randomly chosen from a Gaussian distribution of mean zero and variance V A N 0 , where N 0 means the shot noise variance. Then, Bob randomly chooses to measure either x or p by homodyne detection and announces overtly to Alice which one he measured, so that she discards the irrelevant data. After several rounds of exchanges, Alice and Bob will share a set of correlated Gaussian variables, which are employed for further secret key extractions by way of post-processing procedures, including parameter estimation, reverse reconciliation and amplification. The above-mentioned process can be seen in Figure 1. To maintain consistency, the reconciliation protocol has to be unidirectional (from Bob to Alice) [27,28,29]. As LDoS attacks mainly aim at the process of parameter estimation, we will introduce the principle of parameter estimation methods of GMCS protocol at length in the following part.
Some parameters in parameter estimation are determined by the instruments’ characteristic and measured beforehand. The detector efficiency η and the electrical noise V e l of Bob’s end are relatively stable in experimental repetition, thus we measure them in advance and treat them as constants during the communication. The shot noise can be expressed as N 0 = K N 0 E L O , where K N 0 is a parameter that needs to be calibrated before communication, and E L O is the power of the local oscillator.
Others, including channel transmittance T and channel excess noise ε , demand estimation in real time. Exploiting this loophole, Eve manipulates the parameters to cause estimation deviation till the communicating parties think the channel insecure and close it. In this way, an attack succeeds. In the GMCS protocol, some shared Gaussian variables are disclosed to estimate the channel transmittance and channel excess noise; others are used for key extraction and we generally estimate the above-mentioned parameters by means of statistical methods. In the classical parameter estimation method, Alice and Bob’s data are associated with each other through the linear model y = t x + z , where t = T R and z follows a centered normal distribution with unknown variance σ 2 = 1 + T ε .
According to the above linear model, adopting the maximum likelihood estimation method and neglecting the finite-size effect of limited data, we are able to estimate the value of the channel transmittance T and the channel excess noise ε as below
t ^ = i = 1 m x i y i i = 1 m x i 2
σ ^ 2 = 1 m i = 1 m ( y i t ^ x i ) 2 ,
where t ^ is the estimated value of T , and σ ^ 2 is the estimated value of 1 + T ε . Furthermore, t ^ and σ ^ 2 comply with the normal distribution and chi-square distribution, respectively,
t ^ N ( t , σ 2 i = 1 m x i 2 ) σ ^ 2 X 2 ( m 1 ) ,
where t and σ 2 are the true values of the parameters T and 1 + T ε , respectively.
Using Equations (1) and (2), we can estimate the value of T and ε convincingly. The authors of [30] proposed a method under the condition of considering the finite-size effect, while for the sake of simplicity, we do not consider the effect as it only degrades the precision of results. In the rest of this section, we will analyze the impact caused by Eve’s arbitrary manipulations in channel parameters under the framework of this parameter estimation method.
In the optical fiber transmission system, we generally treat the channel’s transmittance as a constant when making parameter estimations. Nonetheless, in consideration of Eve’s control of the channel, she can intentionally modify the characteristics of the channel, which will lead to deviations to parameter estimations. Such manipulation is a so-called denial-of-service attack, since it can make the actual secure channel perceived as insecure by two parties and lead to the communication discontinuance [20]. Now, we begin with Equations (1) and (2) to analyze the effects of DoS attacks.
As mentioned before, channel transmittance T and excess noise ε are the two parameters we lay stress on. We assume that Alice modulates X and Bob measures Y, where X is a cosine signal and Y is an X-distorted signal that is presented in the phase deviation and linear noise. Next, due to the phase compensation technique and the linear noise mean value of 0, the following formula can be obtained
t ^ = E ( T ) ,
where we highlight the conclusion. From Equation (4) we can draw the following conclusions: if the transmittance T is a constant, the estimated t ^ equals to the true value T , while if not, there will be deviations in our estimation.
Similarly, by using the equivalent relations in Equation (4) and equation V A = E ( X 2 ) , we can rewrite Equation (2)
σ ^ 2 = E ( T ) ε + 1 + E ( T ) V A ( E ( T ) ) 2 V A .
Likewise, if the transmittance T is a constant, the estimated σ ^ 2 equals to the true value 1 + T ε , while if not, E ( T ) V A ( E ( T ) ) 2 V A which will bring about inaccuracy in excess noise estimation.
Through the above brief analysis, Eve’s DoS attack strategy, namely making the parameter estimation deviates from the true value by manipulating the channel transmittance T, has been demonstrated. For the detailed derivation process, refer to Appendix A. As for the LDoS attack, it is one type of DoS attacks and conforms to their basic principles, characterized by the good quality of concealment.

2.2. Detection Principle of LDoS Attack by Spectral Estimation

Though Y. Li et al. suggested a countermeasure based on post-selection to suppress the DoS attack [20], there is still a vacancy in the detection of LDoS attacks. Y. Chen et al. analyzed the PSD distribution over the frequency domain to find that LDoS attacks are mainly distributed in the low-frequency band rather than broadband distribution of the normal traffic [22]. Hence, we can use such feature to effectively detect an LDoS attack and the flow chart of the detection method is shown in Figure 2.
The power spectrum gives us an insight into the characteristics of the generalized stationary stochastic process in frequency domain, such as periodicity, peak position, frequency range, etc. The power spectrum of zero-mean generalized stationary stochastic process { x n } is defined as
S x ( e j w ) m = + R x ( m ) e j w m ,
namely Wiener–Khinchin theorem, where the autocorrelation sequence R x ( m ) is defined as
R x ( m ) E [ x ( n ) x * ( n + m ) ] lim N 1 2 N + 1 n = N N x ( n ) x * ( n + m ) ,
where N means the length of sample data. It is noteworthy that Equations (6) and (7) are only of theoretical significance for reasons as follows: first, there is no way to collect infinite data, and second, there is always noise mixed in our data. In any event, the spectral estimation of { x n } is then transformed into the estimation of its autocorrelation sequence R x ( m ) . With regard to the stochastic process whose mean value is not equal to 0, its power spectrum will not change after eliminating the mean value, and thus only discussing the case where the mean value is 0 does not lose the conclusions’ generality [31]. In this section, we are going to compare three spectral estimation approaches from the perspective of consistency of estimations and discuss whether they are unbiased estimations.

2.2.1. Autocorrelation Estimation with Rectangular Window

Since it is impossible to get unlimited data, we can intercept a certain length of data by using the window function. Here, the rectangular window is our first consideration. We assume that x ( n ) is a sampling sequence of stochastic process { x n } and we intercept a segment of x ( n ) as
x N ( n ) = w R ( n ) x ( n ) = x ( n ) , 0 n N 1 0 , e l s e ,
where w R ( n ) is a rectangular window of length N
w R ( n ) = 1 , 0 n N 1 0 , e l s e .
When the length of sample data is N, the autocorrelation R x ( m ) is estimated as
R ^ x ( m ) = n = + x N ( n ) x N * ( n + m ) N m , m N 1 0 , e l s e ,
which can be simplified as
R ^ x ( m ) = n = 0 N 1 m x ( n ) x * ( n + m ) N m , m N 1 0 , e l s e .
Next, we find the mathematical expectation of R ^ x ( m )
E [ R ^ x ( m ) ] = n = 0 N 1 m E [ x ( n ) x * ( n + m ) ] N m = n = 0 N 1 m R x ( m ) N m = R x ( m ) ,
which has values only if m N 1 and 0 in other cases. According to Equation (12), when R ^ x ( m ) is used as the estimate of R x ( m ) , estimation bias B = R x ( m ) E [ R ^ x ( m ) ] = 0 , namely R ^ x ( m ) is the unbiased estimation. By the estimation of R x ( m ) , the estimation of the power spectrum ( P ^ x ( ω ) ) can be obtained
P ^ x ( ω ) = m = ( N 1 ) N 1 R ^ x ( m ) e j w m ,
whose mathematical expectation is the convolution of frequency spectrum and rectangular window spectrum. When N , the mean value is
lim N E [ P ^ x ( ω ) ] = m = + w R ( m ) R x ( m ) e j w m = m = + R x ( m ) e j w m = P x ( ω ) ,
from which P x ( ω ) is the true value of power spectrum and we can see that P ^ x ( ω ) is the asymptotic unbiased estimation, as when N , w R ( m ) 1 .
However, the Fourier transform of rectangular window function
W R ( e j w ) = n = ( N 1 ) N 1 w R ( n ) e j w n = n = ( N 1 ) N 1 e j w n = s i n ( w ( 2 N 1 ) 2 ) s i n ( w 2 )
shows that it has values in negative number field which may lead to P ^ x ( ω ) less than zero subsequently. As there is no physics meaning if P ^ x ( ω ) < 0 , the autocorrelation estimation with rectangular window is not used to estimate the power spectrum generally.

2.2.2. Periodogram with Bartlett Window

Due to the defects of rectangular window that some results are inconsistent with physics meaning and the estimation error is comparatively large when the value of m is close to N, we consider using Bartlett window to optimize,
w B ( m ) = 1 m N , m N 1 0 , e l s e .
Thus, we get another estimate of R x ( m )
R ^ x ( m ) = n = 0 N 1 m x ( n ) x * ( n + m ) N , m N 1 0 , e l s e ,
whose link with Equation (10) can be expressed as R ^ x m = ( N m ) R ^ x ( m ) / N . Therefore, the mathematical expectation of R ^ x ( m ) can be easily obtained
E [ R ^ x ( m ) ] = E [ N m N R ^ x ( m ) ] = N m N R x ( m ) ,
which means R ^ x ( m ) is the biased estimate of R x ( m ) because estimation bias B = R x ( m ) R ^ x ( m ) = m R x ( m ) / N is not equal to 0. While because of
lim N E [ R x ( m ) ] = lim N N m N R x ( m ) = R x ( m ) ,
hence the autocorrelation estimation based on Bartlett window is the asymptotic unbiased estimation.
More importantly, the Fourier transform of Bartlett window can be regarded as the conjugated product of the rectangular window’s Fourier transform
W B ( e j w ) = W R ( e j w ) W R * ( e j w ) = 1 N s i n ( w N 2 ) s i n ( w 2 ) 2 ,
which ensures the power spectrum estimation obtained later is greater than 0, thus being consistent with the physics meaning. Similarly, according to Equation (13), the mathematical expectation of power spectrum estimation can be deduced as
E [ P ^ x ( ω ) ] = E [ m = + R ^ x ( m ) e j w m ] = m = ( N 1 ) N 1 w B ( m ) R x ( m ) e j w m = 1 2 π W B ( ω ) P x ( ω ) = 1 2 π π π W B ( ξ ) P x ( ω ξ ) d ξ ,
which demonstrates its mean value is the convolution of frequency spectrum and Bartlett window spectrum. When N , referring to Equation (14), it is not hard to draw that E [ P ^ x ( ω ) ] P x ( ω ) .
Another indicator to measure estimation performance is estimate consistency, which can be represented by estimation variance
V a r [ P ^ x ( ω ) ] P x 2 1 + s i n ( ω N ) N s i n ω 2 ,
from which we can find spectral estimation with Bartlett window is not a consistent estimation. Based on the above analyses, it is appropriate to make spectral estimations by using autocorrelation estimations with Bartlett window, though the results are not consistent.
Regrettably, the approach based on Equation (6) is still not simple enough, and then the so-called direct calculation approach of periodogram is proposed,
P ^ x ( ω ) = m = + R ^ x ( m ) e j w m = 1 N m = + n = + x N ( n + m ) x N * ( n ) e j w m = n + m = k 1 N n = + k = + x N ( k ) e j w k x N * ( n ) e j w n = 1 N n = 0 N 1 x ( n ) e j w n 2 = 1 N X N ( e j w ) 2 ,
where X N ( e j w ) = n = 0 N 1 x ( n ) e j w m . In this way, we no longer need to estimate the autocorrelation function, but obtain spectral estimation by directly Fourier transforming the sequence data and then squaring their modulus.
In a word, periodogram with Bartlett window guarantees the power spectrum greater than 0 and simultaneously the calculation is relatively simple, while the defect lies in the estimation inconsistency.

2.2.3. The Bartlett Approach

The result of periodogram is the asymptotic unbiased estimation, but not the consistent estimation of power spectrum. Inspired by Equation (14), if we could find the consistent estimation of E [ P ^ x ( ω ) ] , and correspondingly the consistent estimation of P x ( ω ) is then gained.
According to the statistic theory, the arithmetic mean of a set mutually independent data of a stochastic variable is the consistent estimation of this variable’s mathematical expectation. Consequently, we take several mutually independent sampling sequences of a stochastic process and average their periodogram results. The mean value so obtained would be the consistent spectral estimation of the stochastic process. Such approach is the so-called average periodogram, or the Bartlett approach.
Refer to the algorithm model in Figure 3, for data with N points, they are divided into L segments, each of which has M points, namely N = L × M . For each segment, we perform periodogram with Bartlett window separately to estimate power spectrum
P ^ i ( ω ) = m = + R ^ i ( m ) e j w m , ( 1 i L )
and then average the total L segments’ estimation results
P ^ b ( ω ) = 1 L i = 1 L P ^ i ( ω ) = 1 L i = 1 L m = + R ^ i ( m ) e j w m = m = + 1 L i = 1 L R ^ i ( m ) e j w m ,
which means find out each segment’s autocorrelation function, calculate the average value and then conduct Fourier Transform.
P i ( ω ) can be approximately regarded as mutually independent in the case of M 1 , hence the estimation variance of the Bartlett approach is
V a r [ P ^ b ( ω ) ] 1 L 2 i = 0 L V a r [ P ^ i ( ω ) ] = 1 L V a r [ P ^ i ( ω ) ] .
Considering the limiting case of L , the variance V a r [ P ^ b ( ω ) ] 0 , demonstrating the Bartlett approach is the consistent estimation.

3. Performance

3.1. Comparison with the Wavelet Approach

The detection principle of the traditional method, based on wavelet feature extraction and Hurst index estimation [32], is such that when the DoS attack occurs, the Hurst index of network traffic will decrease. The Hurst index of normal network traffic is roughly between 0.75 and 1, and the larger the Hurst index, the stronger the burst of traffic [33]. When the channel is completely blocked, the network traffic tends toward a Poisson distribution, and the Hurst index becomes 0.5. However, as the DDoS and LDos attack both are a type of DoS attack and will cause the drop of the Hurst index in the same way, it is unattainable to achieve the goal of distinguishing these two attacks. Moreover, the complexity of the wavelet transform is higher than that of the power spectrum estimation.
Based on a NS-2 simulation environment from Rice University, the performance of the wavelet approach and the Bartlett approach in LDoS attack detection accuracy is compared in Table 1. Only DDoS and LDoS attacks are set in the simulation environment. It can be seen from Table 1 that the wavelet approach has almost no ability to distinguish these two attacks.

3.2. Estimation Consistency and Detection Effect

To verify the validity of our proposed detection approach, we initially compare the performance of estimation consistency, then detect the traffic containing LDoS attack streams by analyzing the distribution of normalized cumulative power spectrum density (NCPSD) in frequency band to test the authenticity of our approach. The authors of [20] conducted relevant simulation experiments to prove that a slight change in transmittance T will result in the keyrate-distance product decrease. A typical experiment in Ref. [20] shows that, in the channel where T obeys a two-point distribution, when p, which means the probability that the channel transmittance is non-zero, drops from 1 to 0.99, the channel’s secure transmission distance is reduced by more than half. Therefore, the LDoS attack stream in our experimental data mainly aims at tempering the transmittance T. As for the data used to test the estimation consistency, we adopt the filtered Gaussian white noise as the stochastic process sequence with a normalized center frequency (see Appendix B for definition) of 0.1 and a relative bandwidth (see Appendix B for definition) of 4%. Moreover, the sampling frequency is 100 Hz in the estimation consistency experiment.
As shown in Figure 4, our experiment data are filtered from Gaussian white noise by FIR filter with Blackman window and the data length is 1800 points. We carefully select the order of filter to balance the signal distortion and filtering effect. In accordance with a sampling frequency of 100 Hz, it can be calculated that the analog frequency corresponding to the normalized frequency of 0.1 should be 0.1 × 100 Hz/2 = 5 Hz.
After that, we successively used the periodogram with Bartlett window and the Bartlett approach to estimate the power spectrum of experiment data. In order to put stress on the estimation consistency, the power spectrum’s details in the vicinity of the center frequency are magnified in Figure 5. Both spectral estimation approaches estimate twice to analyze the consistency of the estimation.
Comparing the two figures in Figure 5, except the discovery that the performance in consistency of the Bartlett approach outperforms the periodogram with Bartlett window, we can also find that the curve of the Bartlett approach is smoother and its center frequency peak is more distinct. Hence, the Bartlett approach’s estimation consistency has been strongly verified.
In the simulation experiment, the Bartlett approach is used for the spectral estimation. Using the NCPSD (see Appendix B for definition) calculation of the LDoS attack stream under different background traffic intensities, we test the feasibility of the proposed method to detect the LDoS attacks.
As shown in Figure 6a, the stream with the LDoS attacks has an energy distribution close to 70% of the total energy in the range of 0 to 50 Hz, while the normal stream has only 10% energy in this range. It, at the same time, proves that we can calculate the deviation of the NCPSD from the normal value to reflect whether the stream contains LDoS attacks.
Figure 6b shows the NCPSD curves of stream with the LDoS attack and the normal one. In spite of the narrowed difference between the two curves, there is 30% of the total energy distributed within the range of 0 to 50 Hz, which is still quite deviated from 10% of the normal stream. That is to say, under the high intensity of background traffic, the detection effect has declined to some extent, but it can still detect whether the stream contains LDoS attacks.

4. Conclusions

In our paper, a method based on Bartlett’s approach of spectral estimation is proposed to detect LDoS attacks in the CVQKD communicating progress. The LDoS attack is an algorithm-aimed hacking strategy and related experiments have already demonstrated that a slight manipulation of a channel’s parameters can trigger the communication interruption. What we pay attention to is the channel’s transmittance T, as other parameters can be deduced from it. Taking advantage of the periodicity of LDoS attacks, we obtain the rule that the PSD of the LDoS attack stream is higher than normal in the low frequency domain, hence transforming the issue of the LDoS attack detection into the spectral estimation of stochastic sequence. Three of the spectral estimation approaches are discussed emphatically, including the autocorrelation estimation with rectangular window, periodogram with Bartlett window and the Bartlett approach, from the perspective of estimation consistency and estimation unbiasedness. Through mathematical deduction and experimental analysis, the Bartlett approach performs best among the three approaches. The simulation experiment results show that the Bartlett approach is consistent in its estimations and can effectively detect the LDos attacks.

Author Contributions

Conceptualization, E.D.; methodology, L.Z.; resources, L.Z.; data curation, E.D. and L.Z.; writing—original draft preparation, E.D.; software, E.D.; writing—review and editing, D.H. and L.Z.; supervision, D.H. and L.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data that support the findings of this study are available from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
CVQKDContinuous-variable quantum key distribution
DVQKDDiscrete-variable quantum key distribution
DoSDenial-of-service
LDoSLow-rate denial-of-service
PSDPower spectral density
GMCSGaussian-modulated coherent state
LOLocal oscillator
TCPTransmission control protocol
NCPSDNormalized cumulative power spectral density
FIRFinite impulse response

Appendix A. Detailed Derivation and Proof of the LDoS Attack Strategy

In Section 2.1, we have briefly explained the LDoS attack strategy against the GMCS protocol. In this part, the rigorous mathematical derivation is given. During a communication, Alice modulates X and Bob measures Y, both X and Y are Gaussian variables, and their expressions are as follows
X = A c o s ( θ ) Y = T A c o s ( θ + Δ φ ) + A N ,
where A is the amplitude of the coherent state that is modulated by AM, θ is the phase of the coherent state that modulated by PM, T is the channel transmittance, Δ φ is the phase deviation generated by the quantum channel and A N is the linear error caused by the noise. Once again, the finite-size effect is left out of consideration and we regard detector efficiency η and electrical noise V e l as fixed values. Substitute Equation (A1) into Equation (1) and then the following formula can be obtained
t ^ = 1 m i = 1 m x i y i 1 m i = 1 m x i 2 = E ( X Y ) E ( X 2 ) = E ( T A 2 c o s ( θ ) c o s ( θ + Δ φ ) ) + E ( A N A c o s ( θ ) ) E ( A 2 c o s 2 ( θ ) ) .
Then, in view of the phase compensation technique could rectify the phase shift and the mean value of A N caused by noise equals 0, we reckon that Δ φ 0 and E ( A N A c o s ( θ ) ) = E ( A N ) E ( A c o s ( θ ) ) = 0 . Such being the case, we can simplify Equation (A2) to
t ^ = E ( T A 2 c o s 2 θ ) E ( A 2 c o s 2 θ ) = E ( T ) E ( A 2 c o s 2 θ ) + c o v ( T , A 2 c o s 2 θ ) E ( A 2 c o s 2 θ ) = E ( T ) E ( A 2 c o s 2 θ ) E ( A 2 c o s 2 θ ) = E ( T ) .
The covariance c o v ( T , A 2 c o s 2 θ ) equals 0 because the parameter T is irrelevant to Alice’s modulation process. Ulteriorly, by using the equivalent relations in Equation (A3) and equation V A = E ( X 2 ) = E ( A 2 c o s 2 θ ) , we can get the σ ^ 2 as
σ ^ 2 = E ( Y t ^ X ) 2 = E ( Y 2 2 t ^ X Y + t ^ 2 X 2 ) = E ( T ε ) + 1 + E ( T X 2 ) 2 t ^ E ( X Y ) + t ^ 2 E ( X 2 ) = E ( T ) ε + 1 + E ( T ) V A ( E ( T ) ) 2 V A .
Equations (A3) and (A4) fully prove that T is a key parameter in channel estimation. Eve can carry out attacks by manipulating T.

Appendix B. Definition of Some Key Parameters

In this part, we give the definitions of key parameters that are not provided in the manuscript.

Appendix B.1. NCPSD

The normalized cumulative power spectrum density is defined as
ϕ ( f ) = i = 1 f P S D ( i ) / i = 1 f m a x P S D ( i ) ,
where P S D ( i ) means the power spectral density of ith frequency component. The value range of NCPSD is 0 to 1, and NCPSD reflects the proportion of different frequency components in the whole signal.

Appendix B.2. Normalized Frequency

The normalized frequency is defined as
ω = 2 π f f s ,
where f means the analog frequency and f s means the sampling frequency. It takes the sampling frequency as the reference value. In this way, a unified standard is achieved, which is conducive to comparing the distribution of various frequencies.

Appendix B.3. Relative Bandwidth

Relative bandwidth is defined as
f r b = 2 ( f H f L ) f H + f L ,
where f H and f L are the upper and lower limit frequencies, respectively.

References

  1. Rivest, A.; Shamir, L.; Adleman, T. A method for obtaining digital signature and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
  2. Kumar, A.; Garhwal, S. State-of-the-Art Survey of Quantum Cryptography. Arch. Comput. Methods Eng. 2021, 28, 2831–2868. [Google Scholar] [CrossRef]
  3. Scarani, V.; Bechmann-Pasquinucci, H.; Cerf, N.; Dusek, M.; Lütkenhaus, N.; Peev, M. The security of practical quantum key distribution. Rev. Mod. Phys. 2009, 81, 1301. [Google Scholar] [CrossRef] [Green Version]
  4. Li, C.; Qian, L.; Lo, H.-K. Simple security proofs for continuous variable quantum key distribution with intensity fluctuating sources. npj Quantum Inf. 2021, 7, 150. [Google Scholar] [CrossRef]
  5. Gisin, N.; Ribordy, G.; Tittel, W.; Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 2002, 74, 145. [Google Scholar] [CrossRef] [Green Version]
  6. Weedbrook, C.; Pirandola, S.; García-Patrón, R.; Cerf, N.; Ralph, T.; Shapiro, J.; Lloyd, S. Gaussian quantum information. Rev. Mod. Phys. 2011, 84, 621–669. [Google Scholar] [CrossRef]
  7. Diamanti, E.; Leverrier, A. Distributing secret keys with quantum continuous variables: Principle, security and implementations. Entropy 2015, 17, 6072. [Google Scholar] [CrossRef]
  8. Ye, W.; Guo, Y.; Xia, Y.; Zhong, H.; Zhang, H.; Ding, J.Z.; Hu, L.Y. Discrete modulation continuous-variable quantum key distribution based on quantum catalysis. Acta Phys. Sin. 2020, 69, 060301. [Google Scholar] [CrossRef]
  9. Grosshans, F.; Grangier, P. Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 2002, 88, 057902. [Google Scholar] [CrossRef] [Green Version]
  10. Navascués, M.; Grosshans, F.; Acín, A. Optimality of gaussian attacks in continuous-variable quantum cryptography. Phys. Rev. Lett. 2006, 97, 190502. [Google Scholar] [CrossRef] [Green Version]
  11. Furrer, F.; Franz, T.; Berta, M.; Leverrier, A.; Scholz, V.B.; Tomamichel, M.; Werner, R.F. Continuous variable quantum key distribution: Finite-key analysis of composable security against coherent attacks. Phys. Rev. Lett. 2012, 109, 100502. [Google Scholar] [CrossRef] [PubMed]
  12. García-Patrón, R.; Cerf, N.J. Unconditional optimality of gaussian attacks against continuous-variable quantum key distribution. Phys. Rev. Lett. 2006, 97, 190503. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  13. García-Patrón, R.; Cerf, N.J. Composable security proof for continuous-variable quantum key distribution with coherent states. Phys. Rev. Lett. 2015, 114, 070501. [Google Scholar]
  14. Hao, Q.; Rupesh, K.; Romain, A. Saturation attack on continuous-variable quantum key distribution system. In Proceedings of the Emerging Technologies in Security and Defence; and Quantum Security II; and Unmanned Sensor Systems X, Dresden, Germany, 29 October 2013; Volume 8899. [Google Scholar]
  15. Ma, X.-C.; Sun, S.-H.; Jiang, M.-S.; Liang, L.-M. Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol. Phys. Rev. A 2013, 87, 052309. [Google Scholar] [CrossRef] [Green Version]
  16. Wiechers, C.; Lydersen, L.; Wittmann, C.; Elser, D.; Skaar, J.; Marquardt, C.; Makarov, V.; Leuchs, G. After-gate attack on a quantum cryptosystem. New J. Phys. 2011, 13, 013043. [Google Scholar] [CrossRef] [Green Version]
  17. Ferenczi, A.; Grangier, P.; Grosshans, F. Calibration attack and defense in continuous variable quantum key distribution. In Proceedings of the European Conference on Lasers and Electro-Optics and the International Quantum Electronics Conference, Munich, Germany, 17–22 June 2007; p. 1. [Google Scholar]
  18. Silva, T.; Xavier, G.; Temporäo, G.; von der Weid, J.P. Real-time monitoring of single-photon detectors against eavesdropping in quantum key distribution systems. Opt. Express 2012, 20, 18911. [Google Scholar] [CrossRef]
  19. Huang, P.; Huang, J.; Wang, T.; Li, H.; Huang, D.; Zeng, G. Robust continuous-variable quantum key distribution against practical attacks. Phys. Rev. A 2017, 95, 052302. [Google Scholar] [CrossRef]
  20. Li, Y.; Huang, P.; Wang, S.; Wang, T.; Li, D.; Zeng, G. A denial-of-service attack on fiber-based continuous-variable quantum key distribution. Phys. Lett. A 2018, 382, 3253. [Google Scholar] [CrossRef]
  21. Kuzmanovic, A.; Knightly, E. Low-rate tcp-targeted denial of service attacks and counter strategies. IEEE/ACM Trans. Netw. 2006, 14, 683. [Google Scholar] [CrossRef]
  22. Chen, Y.; Hwang, K. Collaborative detection and filtering of shrew ddos attacks using spectral analysis. J. Parallel Distrib. Comput. 2006, 66, 1137. [Google Scholar] [CrossRef]
  23. Antonio, M.; Santiago, S.; Geert, L.; Alejandro, R. Stationary Graph Processes and Spectral Estimation. IEEE Trans. Signal Process. 2017, 65, 5911–5926. [Google Scholar]
  24. Bai, J.; Ma, L. Detection of Range-Spread Target in Spatially Correlated Weibull Clutter Based on AR Spectral Estimation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2021, E104.A, 305–309. [Google Scholar] [CrossRef]
  25. Konar, A.; Sidiropoulos, N.D.; Mehanna, O. Parametric Frugal Sensing of Power Spectra for Moving Average Models. IEEE Trans. Signal Process. 2015, 63, 1073–1085. [Google Scholar] [CrossRef]
  26. Teles, P.; Sousa, P. The effect of temporal aggregation on the estimation accuracy of ARMA models. Commun. Stat.-Simul. Comput. 2018, 47, 2865–2885. [Google Scholar] [CrossRef]
  27. Grosshans, F.; Van Assche, G.; Wenger, J.; Brouri, R.; Cerf, N.J.; Grangier, P. Quantum key distribution using gaussian-modulated coherent states. Nature 2003, 421, 238–241. [Google Scholar] [CrossRef] [Green Version]
  28. Cerf, N.J.; Grangier, P. From quantum cloning to quantum key distribution with continuous variables: A review (Invited). J. Opt. Soc. Am. B 2007, 24, 324–334. [Google Scholar] [CrossRef] [Green Version]
  29. Luo, H.; Wang, Y.; Ye, W.; Zhong, H.; Mao, Y.; Guo, Y. Parameter estimation of continuous variable quantum key distribution system via artificial neural networks. Chin. Phys. B 2022, 31, 2. [Google Scholar] [CrossRef]
  30. Leverrier, A.; Grosshans, F.; Grangier, P. Finite-size analysis of a continuous-variable quantum key distribution. Phys. Rev. A 2010, 81, 062343. [Google Scholar] [CrossRef] [Green Version]
  31. Yu, X.D.; Gühne, O. Detecting coherence via spectrum estimation. Phys. Rev. A 2019, 99, 062310. [Google Scholar] [CrossRef] [Green Version]
  32. He, Y.X.; Cao, Q.; Liu, T.; Han, Y.; Xiong, Q. A Low-Rate DoS Detection Method Based on Feature Extraction Using Wavelet Transform. J. Softw. 2009, 20, 930–941. [Google Scholar]
  33. Wu, Z.J.; Li, H.J.; Liu, L.; Zhang, J.A.; Yue, M.; Lei, J. Detection of LDoS Attacks Based on Wavelet Energy Entropy and Hidden Semi-Markov Models. J. Softw. 2020, 31, 1549–1562. [Google Scholar]
Figure 1. In the GMCS CVQKD protocol, Alice encodes the secret key information by modulating the quadratures x and p of coherent states with independent Gaussian distributions and sends them to Bob through an insecure channel controlled by Eve. Next, the homodyne detector on Bob’s end obtains the transmitted information. Then, some of the shared Gaussian variables are disclosed for channel estimation. Lastly, shared Gaussian variables are used to extract keys.
Figure 1. In the GMCS CVQKD protocol, Alice encodes the secret key information by modulating the quadratures x and p of coherent states with independent Gaussian distributions and sends them to Bob through an insecure channel controlled by Eve. Next, the homodyne detector on Bob’s end obtains the transmitted information. Then, some of the shared Gaussian variables are disclosed for channel estimation. Lastly, shared Gaussian variables are used to extract keys.
Photonics 09 00365 g001
Figure 2. The flow chart of LDoS attack detection. The Bartlett approach is used to obtain the PSD of traffic data, and then normalized cumulative power spectrum density (NCPSD) is gained after the normalization process. Judge whether there is an attack by analyzing the distribution of NCPSD in low frequency domain at last.
Figure 2. The flow chart of LDoS attack detection. The Bartlett approach is used to obtain the PSD of traffic data, and then normalized cumulative power spectrum density (NCPSD) is gained after the normalization process. Judge whether there is an attack by analyzing the distribution of NCPSD in low frequency domain at last.
Photonics 09 00365 g002
Figure 3. The algorithm model of the Bartlett approach.
Figure 3. The algorithm model of the Bartlett approach.
Photonics 09 00365 g003
Figure 4. Data of estimation consistency experiment. Raw data is the Gaussian white noise with mean value of 0 and variance of 1. Filtered data is obtained by filtering the raw data with a high-order FIR filter. The figure on the right is the spectogram, distributed around 5 Hz, of filtered data.
Figure 4. Data of estimation consistency experiment. Raw data is the Gaussian white noise with mean value of 0 and variance of 1. Filtered data is obtained by filtering the raw data with a high-order FIR filter. The figure on the right is the spectogram, distributed around 5 Hz, of filtered data.
Photonics 09 00365 g004
Figure 5. Comparison of estimation consistency. (a) Adopting the periodogram with Bartlett window for spectral estimation. (b) Adopting the Bartlett approach (average periodogram) for spectral estimation.
Figure 5. Comparison of estimation consistency. (a) Adopting the periodogram with Bartlett window for spectral estimation. (b) Adopting the Bartlett approach (average periodogram) for spectral estimation.
Photonics 09 00365 g005
Figure 6. NCPSD under different background traffic intensity.(a) NCPSD of attack stream and normal stream under low background traffic. (b) NCPSD of attack stream and normal stream under high background traffic.
Figure 6. NCPSD under different background traffic intensity.(a) NCPSD of attack stream and normal stream under low background traffic. (b) NCPSD of attack stream and normal stream under high background traffic.
Photonics 09 00365 g006
Table 1. Detection accuracy of LDoS attack.
Table 1. Detection accuracy of LDoS attack.
MethodAccuracy
The wavelet approach with Hurst estimation53%
The Bartlett approach with NCPSD88%
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Dai, E.; Huang, D.; Zhang, L. Low-Rate Denial-of-Service Attack Detection: Defense Strategy Based on Spectral Estimation for CV-QKD. Photonics 2022, 9, 365. https://doi.org/10.3390/photonics9060365

AMA Style

Dai E, Huang D, Zhang L. Low-Rate Denial-of-Service Attack Detection: Defense Strategy Based on Spectral Estimation for CV-QKD. Photonics. 2022; 9(6):365. https://doi.org/10.3390/photonics9060365

Chicago/Turabian Style

Dai, Enze, Duan Huang, and Ling Zhang. 2022. "Low-Rate Denial-of-Service Attack Detection: Defense Strategy Based on Spectral Estimation for CV-QKD" Photonics 9, no. 6: 365. https://doi.org/10.3390/photonics9060365

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop