Improving TCP's Robustness to Blind In-Window Attacks

نویسندگان

  • Anantha Ramaiah
  • Randall R. Stewart
  • Mitesh Dalal
چکیده

TCP has historically been considered to be protected against spoofed off-path packet injection attacks by relying on the fact that it is difficult to guess the 4-tuple (the source and destination IP addresses and the source and destination ports) in combination with the 32-bit sequence number(s). A combination of increasing window sizes and applications using longer-term connections (e.g., H-323 or Border Gateway Protocol (BGP) [RFC4271]) have left modern TCP implementations more vulnerable to these types of spoofed packet injection attacks. Many of these long-term TCP applications tend to have predictable IP addresses and ports that makes it far easier for the 4-tuple (4-tuple is the same as the socket pair mentioned in RFC 793) to be guessed. Having guessed the 4-tuple correctly, an attacker can inject a TCP segment with the RST bit set, the SYN bit set or data into a TCP connection by systematically guessing the sequence number of the spoofed segment to be in the current receive window. This can cause the connection to abort or cause data corruption. This document specifies small modifications to the way TCP handles inbound segments that can reduce the chances of a successful attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Increasing the Capacity and PSNR in Blind Watermarking Resist Against Cropping Attacks

Watermarking has increased dramatically in recent years in the Internet and digital media. Watermarking is one of the powerful tools to protect copyright. Local image features have been widely used in watermarking techniques based on feature points. In various papers, the invariance feature has been used to obtain the robustness against attacks. The purpose of this research was based on local f...

متن کامل

Analysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack

Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...

متن کامل

Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking

Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...

متن کامل

Comparison between Intravenous Sodium Valproate and Subcutaneous Sumatriptan for Treatment of Acute Migraine Attacks; Double-Blind Randomized Clinical Trial

Background: Sodium valproate (SV) has been approved for migraine prophylaxis and its intravenous form is used to treat acute migraine attacks. We compared the efficacy and safety of intravenous SV and subcutaneous Sumatriptan in managing acute migraine attacks. Methods: This double-blind randomized clinical trial divided 90 patients into two groups: one group received 400 mg of intravenous SV a...

متن کامل

نشانه‌گذاری نیمه‌کور تصاویر با استفاده از SVD در حوزه تبدیل موجک گسسته

With development of digital multimedia technology and rapid growth of the Internet, illegal copy and exchange of digital multimedia sources is also spread. In such environment, copyright protection plays an essential role. In this paper a new semi- blind image watermarking algorithm for proof of ownership is proposed. At first, the original image is transformed to transform domain and the low f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • RFC

دوره 5961  شماره 

صفحات  -

تاریخ انتشار 2010