Subir material

Suba sus trabajos a SEDICI, para mejorar notoriamente su visibilidad e impacto

 

Mostrar el registro sencillo del ítem

dc.date.accessioned 2012-09-27T18:56:06Z
dc.date.available 2012-09-27T18:56:06Z
dc.date.issued 2007
dc.identifier.uri http://sedici.unlp.edu.ar/handle/10915/21698
dc.description.abstract Recently, awareness has been raised about a number of “blind” attacks that can be performed against the Transmission Control Protocol (TCP) and similar protocols. The consequences of these attacks range from throughput-reduction to broken connections or data corruption. These attacks rely on the attacker's ability to guess or know the four-tuple (Source Address, Destination Address, Source port, Destination Port) that identifies the transport protocol instance to be attacked. While there have been a number of proposals to mitigate these Vulnerabilities, the most obvious mitigation -- TCP port randomization -- has been the one least engineered. In this paper we analyze a number of approaches for the random selection of client port numbers, such that the possibility of an attacker guessing the exact value is reduced. We discuss the potential interoperability problems that may arise from some port randomization algorithms that have been implemented in a number of popular operating systems, and propose a novel port randomization algorithm that provides the obfuscation while avoiding the interoperability problems that may be caused by other approaches. While port randomization is not a replacement for cryptographic methods, the described port number randomization algorithms provide improved security/obfuscation with very little effort and without any key management overhead. en
dc.format.extent 136-146 es
dc.language en es
dc.subject Routing protocols es
dc.subject transport protocols en
dc.subject Standards (e.g., TCP/IP) es
dc.subject port randomization en
dc.subject Internet (e.g., TCP/IP) es
dc.subject obfuscation en
dc.subject blind attacks en
dc.subject Security, integrity, and protection es
dc.title Improving TCP’s Resistance to Blind Attacks through Ephemeral Port Randomization es
dc.type Objeto de conferencia es
sedici.creator.person Gont, Fernando es
sedici.description.note II Workshop de Arquitecturas, Redes y Sistemas Operativos es
sedici.subject.materias Ciencias Informáticas es
sedici.subject.materias Informática es
sedici.description.fulltext true es
mods.originInfo.place Red de Universidades con Carreras en Informática (RedUNCI) es
sedici.subtype Objeto de conferencia es
sedici.rights.license Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5)
sedici.rights.uri http://creativecommons.org/licenses/by-nc-sa/2.5/ar/
sedici.relation.event XIII Congreso Argentino de Ciencias de la Computación es
sedici.description.peerReview peer-review es


Descargar archivos

Este ítem aparece en la(s) siguiente(s) colección(ones)

Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5) Excepto donde se diga explícitamente, este item se publica bajo la siguiente licencia Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5)