[e2e] TCP DoS by manipulating flow-control with fake ACKs?
Ayyasamy, Senthilkumar (UMKC-Student)
saq66 at umkc.edu
Mon Aug 12 11:28:16 PDT 2002
> I'm wondering if there's any literature or folklore about
> denial-of-service attacks based on manipulating TCP flow control
> information to make a remote host waste all of its bandwidth. What I
> have in mind is rapidly generating TCP ACKs for data that you haven't
> received but predict has been sent, to create the illusion that you
> are receiving packets extremely fast and that none are being lost.
> I'd be greateful for any references or other information.
More related paper from savage et all
http://www.caida.org/outreach/papers/2001/BackScatter/
A detailed taxonomy of DDoS attacks:
http://www.lasr.cs.ucla.edu/ddos/ucla_tech_report_020018.pdf
More information about the end2end-interest
mailing list