Informatics, Balkan Conference in (2009)
Sept. 17, 2009 to Sept. 19, 2009
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/BCI.2009.11
This paper presents a realistic method for exploiting an already known insecurity of the Congestion Control behavior of the Transmission Control Protocol that was originally pointed out in 1999 and that affects all known TCP implementations. This insecurity exploits the fundamental assumption of TCP that the communicating remote end is trustworthy and is behaving correctly. We developed a methodology and an algorithm which we used to attack a web server and deceive it in transmitting with a constant rate of 900 Mbits per second. During the attack the server was incapable of reacting to the network congestion it caused.
TCP; congestion control; security; opt-ack
V. Vitsas, S. Harhalakis and N. Samaras, "Exploiting the Congestion Control Behavior of the Transmission Control Protocol," Informatics, Balkan Conference in(BCI), Thessaloniki, Greece, 2009, pp. 203-208.