首页> 外文会议>Annual Joint Conference of the IEEE Computer Societies >Network security via reverse engineering of TCP code: vulnerability analysis and proposed solutions
【24h】

Network security via reverse engineering of TCP code: vulnerability analysis and proposed solutions

机译:网络安全通过TCP代码的逆向工程:漏洞分析和提出的解决方案

获取原文

摘要

The transmission control protocol/Internet protocol (TCP/IP) suite is widely used to interconnect computing facilities in modern network environments. However, there exist several security vulnerabilities in the TCP specification and additional weaknesses in a number of its implementations. These vulnerabilities may enable an intruder to "attack" TCP-based systems, allowing him/her to "hijack" a TCP connection or cause denial of service to legitimate users. We analyze TCP code via a "reverse engineering" technique called "slicing" to identify several of these vulnerabilities, especially those that are related to the TCP state-transition diagram. We discuss many of the flaws present in the TCP implementation of many widely used operating systems, such as SUNOS 4.1.3, SVR4, and ULTRIX 4.3. We describe the corresponding TCP attack "signatures" (including the well-known 1994 Christmas Day Mitnick Attack) and provide recommendations to improve the security state of a TCP-based system, e.g., incorporation of a "timer escape route" from every TCP state.
机译:传输控制协议/互联网协议(TCP / IP)套件广泛用于互连现代网络环境中的计算设施。但是,在TCP规范中存在若干安全漏洞和其数量的额外弱点。这些漏洞可能使入侵者能够“攻击”基于TCP的系统,允许他/她“劫持”TCP连接或导致拒绝服务到合法用户。我们通过称为“切片”的“逆向工程”技术分析TCP代码,以识别这些漏洞中的几个,尤其是与TCP状态转换图相关的技术。我们讨论了在许多广泛使用的操作系统的TCP实施中存在的许多缺陷,例如Sunos 4.1.3,SVR4和Ultrix 4.3。我们描述了相应的TCP攻击“签名”(包括众所周知的1994年圣诞节日Mitnick攻击),并提供建议以改善基于TCP的系统的安全状态,例如,从每个TCP状态结合一个“定时器转义路由” 。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号