Title :
Exploiting the Congestion Control Behavior of the Transmission Control Protocol
Author :
Harhalakis, Stefanos ; Samaras, Nikolaos ; Vitsas, Vasileios
Author_Institution :
Dept. of Inf., TEI of Thessaloniki, Thessaloniki, Greece
Abstract :
This paper presents a realistic method for exploiting an already known insecurity of the congestion control behavior of the transmission control protocol that was originally pointed out in 1999 and that affects all known TCP implementations. This insecurity exploits the fundamental assumption of TCP that the communicating remote end is trustworthy and is behaving correctly. We developed a methodology and an algorithm which we used to attack a Web server and deceive it in transmitting with a constant rate of 900 Mbits per second. During the attack the server was incapable of reacting to the network congestion it caused.
Keywords :
Internet; telecommunication congestion control; transport protocols; Web server; congestion control behavior; network congestion; transmission control protocol; Bandwidth; Data security; Informatics; Internet; Jacobian matrices; Logic; Network servers; Protocols; Robust control; Web server; TCP; congestion control; opt-ack; security;
Conference_Titel :
Informatics, 2009. BCI '09. Fourth Balkan Conference in
Conference_Location :
Thessaloniki
Print_ISBN :
978-0-7695-3783-2
DOI :
10.1109/BCI.2009.11