Font Size: a A A

Sexual Behavior Research, Based On The Tcp Protocol Vulnerabilities

Posted on:2006-06-01Degree:MasterType:Thesis
Country:ChinaCandidate:Q H DengFull Text:PDF
GTID:2208360182968927Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
TCP, which secures connection-oriented, reliable, sequential and end-to-end communication, is one of the most important protocols in transmission layer. However, Attacks on the vulnerabilities of TCP have been endangering the security of network.Mechanism of TCP communication is studied in this article and a model of TCP security vulnerabilities is proposed. Then, principles of TCP vulnerabilities and typical attacks are analyzed.Based on the generation theory of TCP ISN, an algorithm of Phase Space and Fuzzy C-Means Clustering is used to predict ISN, according to L.Ecuyer's PRNG model. This algorithm is simulated to test Windows 2000 SP4 and Windows XP. The results of the simulation confirm a good accuracy of the prediction, which demonstrates that the algorithm is very adaptive to the prediction of pseudo sequences and keys.On the basis of this algorithm, a distributed attack model as Attacker-Agent is designed. By parallel computing and distributed packet sending, no more than 16,000 packets are sent to hijack the victim's TCP connection. Then, some countermeasures including the detection of TCP packets dropping rate are proposed to defend against this attack.Finally we make a summary of what have been done and provide an outlook of the further research direction.
Keywords/Search Tags:TCP, ISN, Phase Space, Fuzzy C-Means Clustering, Distributed Attack
PDF Full Text Request
Related items