Title :
Combating TCP Based Attacks on Mobile Devices
Author :
Njogu, Humphrey Waita ; Li, Xiehua
Author_Institution :
Sch. of Comput. & Commun., Hunan Univ.
Abstract :
TCP based attack is a well known security problem that leads to consumption of mobile devices resources such as bandwidths, batteries as well as memory. The attack is common in new environments providing TCP-based network services (web service, email service) such as peer to peer networks and scenarios where wireless terminals act as servers. Verifying sources sending synchronize (SYN), acknowledge (ACK) or reset (RST) has been a great challenge. The existing solutions have focused much on verifying sources sending SYN requests and therefore encouraging attackers to use invalid RSTs and ACKs thus rendering the TCP servers ineffective. This paper describes two mechanisms that verify the sources sending SYN requests, ACK and RST in order to distinguish invalid requests and responses from legitimate ones. The solution requires minimum modifications to the existing firewalls and reduces attackerspsila effective rate significantly.
Keywords :
authorisation; mobile radio; peer-to-peer computing; telecommunication security; transport protocols; TCP based attack; TCP-based network service; legitimate source; mobile device security; network firewall; peer-to-peer network; spoofed ACK verification; spoofed RST verification; spoofed SYN request verification; wireless terminal; Bandwidth; Batteries; Collaboration; Communication system security; Mobile communication; Mobile computing; Network servers; Peer to peer computing; Protection; Telecommunication traffic; Mobile devices; Spoofed ACK; Spoofed RST; Spoofed SYN request; TCP based attacks;
Conference_Titel :
Computer Science and Software Engineering, 2008 International Conference on
Conference_Location :
Wuhan, Hubei
Print_ISBN :
978-0-7695-3336-0
DOI :
10.1109/CSSE.2008.1164