摘要
论文研究了一种新型的拒绝服务攻击(DoS),利用TCP快速重传/恢复拥塞控制机制的漏洞,使网络周期性地发生拥塞,迫使其他合法TCP连接采取快速重传/恢复,特别是受害服务器的输出流量会严重降低,损害服务质量。相比传统DoS,新型攻击的攻击流均速低,不消耗受害机的资源,可以躲避传统的DoS检测机制。
This paper describes a new type of Denial-of-Service(DoS) attack, which exploits the loop-hole of TCP fast retransmit/recovery congestion control mechanism, lets the network periodically occur congestion, and forces the legiti- mate TCP connections to use fast retransmit/recovery, thus the victim server's output is severely decreased and quality of service is demaged. Compared with traditional DoS, its average rate of attack flow is low and would not consume the victim's resources, so this DoS can avoid traditional DoS detection.
出处
《信息安全与通信保密》
2008年第12期117-119,共3页
Information Security and Communications Privacy
基金
国家高技术研究发展计划(863)项目(2006AA01Z403)
关键词
TCP
快速重传/恢复
低速
拒绝服务
拥塞
TCP
Fast Retransmit/Recovery
Low-Rate
Denial of Service
Congestion