Busque entre los 169128 recursos disponibles en el repositorio
Mostrar el registro sencillo del ítem
dc.date.accessioned | 2012-09-27T18:56:06Z | |
dc.date.available | 2012-09-27T18:56:06Z | |
dc.date.issued | 2007 | |
dc.identifier.uri | http://sedici.unlp.edu.ar/handle/10915/21698 | |
dc.description.abstract | Recently, awareness has been raised about a number of “blind” attacks that can be performed against the Transmission Control Protocol (TCP) and similar protocols. The consequences of these attacks range from throughput-reduction to broken connections or data corruption. These attacks rely on the attacker's ability to guess or know the four-tuple (Source Address, Destination Address, Source port, Destination Port) that identifies the transport protocol instance to be attacked. While there have been a number of proposals to mitigate these Vulnerabilities, the most obvious mitigation -- TCP port randomization -- has been the one least engineered. In this paper we analyze a number of approaches for the random selection of client port numbers, such that the possibility of an attacker guessing the exact value is reduced. We discuss the potential interoperability problems that may arise from some port randomization algorithms that have been implemented in a number of popular operating systems, and propose a novel port randomization algorithm that provides the obfuscation while avoiding the interoperability problems that may be caused by other approaches. While port randomization is not a replacement for cryptographic methods, the described port number randomization algorithms provide improved security/obfuscation with very little effort and without any key management overhead. | en |
dc.format.extent | 136-146 | es |
dc.language | en | es |
dc.subject | Routing protocols | es |
dc.subject | transport protocols | en |
dc.subject | Standards (e.g., TCP/IP) | es |
dc.subject | port randomization | en |
dc.subject | Internet (e.g., TCP/IP) | es |
dc.subject | obfuscation | en |
dc.subject | blind attacks | en |
dc.subject | Security, integrity, and protection | es |
dc.title | Improving TCP’s Resistance to Blind Attacks through Ephemeral Port Randomization | es |
dc.type | Objeto de conferencia | es |
sedici.creator.person | Gont, Fernando | es |
sedici.description.note | II Workshop de Arquitecturas, Redes y Sistemas Operativos | es |
sedici.subject.materias | Ciencias Informáticas | es |
sedici.subject.materias | Informática | es |
sedici.description.fulltext | true | es |
mods.originInfo.place | Red de Universidades con Carreras en Informática (RedUNCI) | es |
sedici.subtype | Objeto de conferencia | es |
sedici.rights.license | Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5) | |
sedici.rights.uri | http://creativecommons.org/licenses/by-nc-sa/2.5/ar/ | |
sedici.relation.event | XIII Congreso Argentino de Ciencias de la Computación | es |
sedici.description.peerReview | peer-review | es |