跳至主導覽 跳至搜尋 跳過主要內容

Malicious packet dropping: how it might impact the TCP performance and how we can detect it

研究成果: Paper同行評審

34   連結會在新分頁中開啟 引文 斯高帕斯(Scopus)

摘要

Among various types of denial of service attacks, 'dropping attack' is probably the most difficult one to handle. This paper explores the negative impacts of packet dropping attacks and a method to detect such attacks. First, three dropping patterns are classified and investigated. We demonstrate that attackers can choose different dropping patterns to degrade TCP service to different levels, and selectively dropping a very small number of packets can result in a severe damage to TCP performance. Second, we show that a hacker can utilize a DDoS attack tool to control a 'uncompromised' router to emulate dropping attacks. This proves that dropping attacks are indeed practically very possible to happen in today's Internet environment. Third, we present a statistic analysis module for the detection of TCP packet dropping attacks. Three measures, session delay, the position and the number of packet reordering, have been implemented in the statistic module. This paper has evaluated and compared their detection performance.

原文English
頁面263-272
頁數10
出版狀態Published - 2000
事件2000 International Conference on Network Protocols - Osaka, Jpn
持續時間: 2000 11月 142000 11月 17

Conference

Conference2000 International Conference on Network Protocols
城市Osaka, Jpn
期間00-11-1400-11-17

All Science Journal Classification (ASJC) codes

  • 軟體

指紋

深入研究「Malicious packet dropping: how it might impact the TCP performance and how we can detect it」主題。共同形成了獨特的指紋。

引用此