Misbehaviors in TCP SACK generation

  • Authors:
  • Nasif Ekiz;Abuthahir Habeeb Rahman;Paul D. Amer

  • Affiliations:
  • University of Delaware, Newark, Delaware;University of Delaware, Newark, Delaware;University of Delaware, Newark, Delaware

  • Venue:
  • ACM SIGCOMM Computer Communication Review
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

While analyzing CAIDA Internet traces of TCP traffic to detect instances of data reneging, we frequently observed seven misbehaviors in the generation of SACKs. These misbehaviors could result in a data sender mistakenly thinking data reneging occurred. With one misbehavior, the worst case could result in a data sender receiving a SACK for data that was transmitted but never received. This paper presents a methodology and its application to test a wide range of operating systems using TBIT to fingerprint which ones misbehave in each of the seven ways. Measuring the performance loss due to these misbehaviors is outside the scope of this study; the goal is to document the misbehaviors so they may be corrected. One can conclude that the handling of SACKs while simple in concept is complex to implement.