【24h】

Protecting mobile devices from TCP flooding attacks

机译:保护移动设备免受TCP泛洪攻击

获取原文

摘要

Network firewalls have played a crucial role in reducing unwanted traffic by blocking unsolicited incoming data. However, for many new environments, (such as in peer-to-peer networks and certain new scenarios where wireless terminals act as servers) not all unsolicited data can be blocked. In wireline networks, this problem can partially be solved by opening dedicated pinholes in the network firewalls to allow unsolicited packets to pass. In cellular and wireless networks, however, opening dedicated pinholes can lead to new forms of denial of service (DoS) attacks that are not seen in wireline networks. For example, an attacker can send undesired data through the pinhole and consume the costly radio resources for which the mobile user will have to pay. By flooding the victim with undesired traffic, the attacker can also drain the battery power of the mobile device. Therefore, in these cases, firewalls can neither simply block all unsolicited traffic nor simply open dedicated pin-holes. In this paper, we describe a mechanism by which a firewall can allow unsolicited TCP traffic to reach a mobile device and yet protect the mobile from the DoS attacks described above. Our approach is transparent to the end hosts and does not require any modification to TCP. Finally, this scheme requires very minimal changes to existing firewalls.
机译:网络防火墙通过阻止未经请求的传入数据,在减少不必要的流量方面发挥了关键作用。但是,对于许多新环境(例如,在对等网络和无线终端充当服务器的某些新方案中),并非所有未经请求的数据都可以被阻止。在有线网络中,可以通过在网络防火墙中打开专用针孔以允许未经请求的数据包通过来部分解决此问题。但是,在蜂窝和无线网络中,打开专用针孔可能导致有线网络中看不到的新型拒绝服务(DoS)攻击。例如,攻击者可以通过针孔发送不需要的数据,并消耗移动用户必须付费的昂贵的无线电资源。通过用不希望的流量泛滥受害者,攻击者还可以消耗移动设备的电池电量。因此,在这些情况下,防火墙既不能简单地阻止所有不请自来的流量,也不能简单地打开专用的针孔。在本文中,我们描述了一种机制,防火墙可以通过该机制允许未经请求的TCP流量到达移动设备,并保护移动设备免受上述DoS攻击。我们的方法对最终主机是透明的,不需要对TCP进行任何修改。最后,此方案需要对现有防火墙进行非常小的更改。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号