Exploiting the Congestion Control Behavior of the Transmission Control Protocol


This paper presents a realistic method for exploiting an already known insecurity of the Congestion Control behavior of the Transmission Control Protocol that was originally pointed out in 1999 and that affects all known TCP implementations. This insecurity exploits the fundamental assumption of TCP that the communicating remote end is trustworthy and is… (More)
DOI: 10.1109/BCI.2009.11

2 Figures and Tables


  • Presentations referencing similar topics