Improving TCP’s Resistance to Blind Attacks through Ephemeral Port Randomization

Recently, awareness has been raised about a number of “blind” attacks that can be performed against the Transmission Control Protocol (TCP) and similar protocols. The consequences of these attacks range from throughput-reduction to broken connections or data corruption. These attacks rely on the att...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autor principal: Gont, Fernando
Formato: Objeto de conferencia
Lenguaje:Inglés
Publicado: 2007
Materias:
Acceso en línea:http://sedici.unlp.edu.ar/handle/10915/21698
Aporte de:
id I19-R120-10915-21698
record_format dspace
institution Universidad Nacional de La Plata
institution_str I-19
repository_str R-120
collection SEDICI (UNLP)
language Inglés
topic Ciencias Informáticas
Informática
Routing protocols
Standards (e.g., TCP/IP)
Internet (e.g., TCP/IP)
Security, integrity, and protection
transport protocols
port randomization
obfuscation
blind attacks
spellingShingle Ciencias Informáticas
Informática
Routing protocols
Standards (e.g., TCP/IP)
Internet (e.g., TCP/IP)
Security, integrity, and protection
transport protocols
port randomization
obfuscation
blind attacks
Gont, Fernando
Improving TCP’s Resistance to Blind Attacks through Ephemeral Port Randomization
topic_facet Ciencias Informáticas
Informática
Routing protocols
Standards (e.g., TCP/IP)
Internet (e.g., TCP/IP)
Security, integrity, and protection
transport protocols
port randomization
obfuscation
blind attacks
description Recently, awareness has been raised about a number of “blind” attacks that can be performed against the Transmission Control Protocol (TCP) and similar protocols. The consequences of these attacks range from throughput-reduction to broken connections or data corruption. These attacks rely on the attacker's ability to guess or know the four-tuple (Source Address, Destination Address, Source port, Destination Port) that identifies the transport protocol instance to be attacked. While there have been a number of proposals to mitigate these Vulnerabilities, the most obvious mitigation -- TCP port randomization -- has been the one least engineered. In this paper we analyze a number of approaches for the random selection of client port numbers, such that the possibility of an attacker guessing the exact value is reduced. We discuss the potential interoperability problems that may arise from some port randomization algorithms that have been implemented in a number of popular operating systems, and propose a novel port randomization algorithm that provides the obfuscation while avoiding the interoperability problems that may be caused by other approaches. While port randomization is not a replacement for cryptographic methods, the described port number randomization algorithms provide improved security/obfuscation with very little effort and without any key management overhead.
format Objeto de conferencia
Objeto de conferencia
author Gont, Fernando
author_facet Gont, Fernando
author_sort Gont, Fernando
title Improving TCP’s Resistance to Blind Attacks through Ephemeral Port Randomization
title_short Improving TCP’s Resistance to Blind Attacks through Ephemeral Port Randomization
title_full Improving TCP’s Resistance to Blind Attacks through Ephemeral Port Randomization
title_fullStr Improving TCP’s Resistance to Blind Attacks through Ephemeral Port Randomization
title_full_unstemmed Improving TCP’s Resistance to Blind Attacks through Ephemeral Port Randomization
title_sort improving tcp’s resistance to blind attacks through ephemeral port randomization
publishDate 2007
url http://sedici.unlp.edu.ar/handle/10915/21698
work_keys_str_mv AT gontfernando improvingtcpsresistancetoblindattacksthroughephemeralportrandomization
bdutipo_str Repositorios
_version_ 1764820464815833092