Title
Exploiting the Congestion Control Behavior of the Transmission Control Protocol
Abstract
This paper presents a realistic method for exploiting an already known insecurity of the Congestion Control behavior of the Transmission Control Protocol that was originally pointed out in 1999 and that affects all known TCP implementations. This insecurity exploits the fundamental assumption of TCP that the communicating remote end is trustworthy and is behaving correctly. We developed a methodology and an algorithm which we used to attack a web server and deceive it in transmitting with a constant rate of 900 Mbits per second. During the attack the server was incapable of reacting to the network congestion it caused.
Year
DOI
Venue
2009
10.1109/BCI.2009.11
BCI
Keywords
Field
DocType
remote end,network congestion,congestion control behavior,constant rate,tcp implementation,web server,realistic method,transmission control protocol,fundamental assumption,congestion control,internet,transport protocols,tcp congestion control
Scalable TCP,TCP Westwood plus,Compound TCP,Computer science,Computer network,Transmission Control Protocol,Network congestion,TCP tuning,TCP Friendly Rate Control,Distributed computing,Explicit Congestion Notification
Conference
Citations 
PageRank 
References 
0
0.34
6
Authors
3
Name
Order
Citations
PageRank
Stefanos Harhalakis110.73
Nikolaos Samaras210515.65
Vasileios Vitsas3556.22