DocumentCode
1963353
Title
Combating TCP Based Attacks on Mobile Devices
Author
Njogu, Humphrey Waita ; Li, Xiehua
Author_Institution
Sch. of Comput. & Commun., Hunan Univ.
Volume
3
fYear
2008
fDate
12-14 Dec. 2008
Firstpage
1113
Lastpage
1118
Abstract
TCP based attack is a well known security problem that leads to consumption of mobile devices resources such as bandwidths, batteries as well as memory. The attack is common in new environments providing TCP-based network services (web service, email service) such as peer to peer networks and scenarios where wireless terminals act as servers. Verifying sources sending synchronize (SYN), acknowledge (ACK) or reset (RST) has been a great challenge. The existing solutions have focused much on verifying sources sending SYN requests and therefore encouraging attackers to use invalid RSTs and ACKs thus rendering the TCP servers ineffective. This paper describes two mechanisms that verify the sources sending SYN requests, ACK and RST in order to distinguish invalid requests and responses from legitimate ones. The solution requires minimum modifications to the existing firewalls and reduces attackerspsila effective rate significantly.
Keywords
authorisation; mobile radio; peer-to-peer computing; telecommunication security; transport protocols; TCP based attack; TCP-based network service; legitimate source; mobile device security; network firewall; peer-to-peer network; spoofed ACK verification; spoofed RST verification; spoofed SYN request verification; wireless terminal; Bandwidth; Batteries; Collaboration; Communication system security; Mobile communication; Mobile computing; Network servers; Peer to peer computing; Protection; Telecommunication traffic; Mobile devices; Spoofed ACK; Spoofed RST; Spoofed SYN request; TCP based attacks;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Science and Software Engineering, 2008 International Conference on
Conference_Location
Wuhan, Hubei
Print_ISBN
978-0-7695-3336-0
Type
conf
DOI
10.1109/CSSE.2008.1164
Filename
4722536
Link To Document