[e2e] TCP DoS by manipulating flow-control with fake ACKs?

Ayyasamy, Senthilkumar (UMKC-Student) saq66 at umkc.edu
Mon Aug 12 11:28:16 PDT 2002


> I'm wondering if there's any literature or folklore about
> denial-of-service attacks based on manipulating TCP flow control
> information to make a remote host waste all of its bandwidth. What I
> have in mind is rapidly generating TCP ACKs for data that you haven't
> received but predict has been sent, to create the illusion that you
> are receiving packets extremely fast and that none are being lost.
> I'd be greateful for any references or other information.

More related paper from savage et all
http://www.caida.org/outreach/papers/2001/BackScatter/ 

A detailed taxonomy of DDoS attacks:
http://www.lasr.cs.ucla.edu/ddos/ucla_tech_report_020018.pdf




More information about the end2end-interest mailing list