نتایج جستجو برای: ack

تعداد نتایج: 901  

2011
Raz Abramov Amir Herzberg

We present Ack-storm DoS attacks, a new family of DoS attacks exploiting a subtle design flaw in the core TCP specifications. The attacks can be launched by a very weak MitM attacker, which can only eavesdrop occasionally and spoof packets (a Weakling in the Middle (WitM)). The attacks can reach theoretically unlimited amplification; we measured amplification of over 400,000 against popular web...

Journal: :Indian Journal of Science and Technology 2016

Journal: :Computer Communications 2005
Mart Molle Zhong Xu

Recently, we introduced a new congestion signaling method called ACK Spoofing, which offers significant benefits over existing methods, such as packet dropping and Explicit Congestion Notification (ECN). Since ACK Spoofing requires the router to create a “short circuit” signaling path, by matching marked data packets in a congested buffer with ACK packets belonging to the same flow that are tra...

Journal: :JCP 2014
Teuku Yuliar Arif Riri Fitri Sari

IEEE 802.11n standard has introduced the new schemes in MAC and HT-PHY layers to improve network throughput. The new schemes in MAC layer are A-MSDU, A-MPDU and Block ACK. In the HT-PHY layer there are MIMO transmission using up to 4 spatial streams, 40 MHz bandwidth channel and 400 ns guard interval. In this paper, we proposed an analytical model that can be used to estimates the throughput of...

Journal: :International Journal of Satellite Communications and Networking 2003

2005
Hao Shang Craig E. Wills

Many TCP connections show an asymmetric traffic pattern where significantly more data is sent in one direction than the other resulting in large numbers of ACK-only packets to be generated. In this work we propose and evaluate two independent approaches for how to make better use of the available space in TCP ACK-only packets to improve data transfer. The first approach provides packet-efficien...

2005
Alex Wun

By identifying weaknesses in TCP’s RFC specifications, Savage et al. are able to bypass TCP’s congestion control behaviours. They specifically demonstrate three techniques: ACK division, DupACK spoofing, and Optimistic ACKing. ACK division increases the sender’s transmission window artificially by ACKing at byte granularity rather than segment granularity. DupACK spoofing sends a stream of dupl...

Journal: :JNW 2013
Weifeng Zhao Xin Huang Kai Shi Lei Zhang

To tackle the major problem of traditional TCP in wireless network, an end-to-end congestion control algorithm (TSBCC) is proposed based on time series. The algorithm creates time series consisting of the time interval of ACK, calculates the next ACK arrival time by the GARCH modal, analyzes the types of data packet loss, and sets congestion window size using different strategies according to d...

2015
Shegufta Bakht Ahsan Nitin Vaidya

In the last few years, the number of wireless devices has increased significantly. Today’s enterprise networks are facing challenges to manage such a large number of devices with the limited wireless resources. To increase the capacity, today’s enterprise networks use a dense deployment of Access Points (APs) [5]. In this scenario, adjacent and overlapping WiFi hotspots (AP-STA clusters, where ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید