期刊文献+

初始序列号生成算法的安全性研究 被引量:1

Research on the Security of Initial Sequence Number Generation Arithmetic
下载PDF
导出
摘要 许多操作系统都采用了强健的TCPISN生成算法,然而TCPReset攻击的成功率并非人们想象的只有1/232·基于PaulWatson的滑动窗口TCPReset攻击方法,并结合了混沌时间序列分析进行序列号猜测的技术,提出一种新的TCPReset攻击方法来验证TCPISN生成算法的安全性·在Windows操作系统下的实验结果表明,该方法增大了TCPReset攻击的成功概率,攻击发送17个RST包在10ms之内即可断开目标TCP连接·目前操作系统的TCPISN生成算法仍有很大安全风险· Many operating systems have already adopted strong TCP ISN generation methods. However, the probability of successful TCP Reset attack is not onlyl/2^32 as people expected. Based on Paul Waston's “slipping in the window: TCP Reset attacks” method, and combined with the sequence number guessing technology which uses chaotic time series analysis, a new TCP Reset attack method is presented in this paper in order to validate the security of TCP ISN generation methods. The experiment results under Windows operating system indicate that this method increases the success probability of TCP Reset attack, and the attackers can terminate the established TCP connection by sending only 17 RST packets in 10 ms. Present Operation Systems' TCP ISN generation methods still have serious security risk.
出处 《计算机研究与发展》 EI CSCD 北大核心 2005年第11期1940-1945,共6页 Journal of Computer Research and Development
基金 航空基金项目 总装备部预研基金项目 北京教育委员会共建项目建设计划基金项目(SYS100060412)~~
关键词 TCP Reset攻击 滑动窗口 序列号猜测 混沌时间序列 TCP Reset attack sliding window sequence number guessing chaotic time series
  • 相关文献

参考文献9

  • 1Steve Bellovin. Defending against sequence number attacks. RFC1948. http:∥www.ietf.org/rfc/rfc1948.txt, 1996-05.
  • 2CERT Coordination Center. Statistical Weaknesses in TCP/IP Initial Sequence Numbers. CERT Advisory CA-2001-09. http:∥www. cert. org/advisories/CA-2001-09. html, 2001-05.
  • 3Network Security Training Conference. http:∥cansecwest.com.Canada , 2005.
  • 4W. Paul. Slipping in the window: TCP Reset attacks.CanSecWest 2004 Conference, Vancouver, Canada, 2004.
  • 5Understanding TCP Reset Attacks. http:∥kerneltrap.org/node/view/3072? PHPSESSID = a298c67142e2fd23af027b7f2d83b2f9,2004-05.
  • 6A. Heffernan. Protection of BGP sessions via the TCP MD5signature option. RFC 2385, 1998.
  • 7J.D. Farmer, J. J. Sidorowich. Predicting chaotic time series.Phys. Rev. Lett., 1987, 59(8): 845~848.
  • 8J.P. Eckmann, D. Ruelle. Ergodic theory of chaos and strange attractors. Review of Modem Physics, 1985, 57(3): 617~656.
  • 9中国教育和科研计算机网紧急响应组.CCERT-060:TCP协议实现漏洞[Z].北京,2004..

同被引文献3

引证文献1

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部