Congestion avoidance and control
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
Making greed work in networks: a game-theoretic analysis of switch service disciplines
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Prudent Engineering Practice for Cryptographic Protocols
IEEE Transactions on Software Engineering
On the generation and use of TCP acknowledgments
ACM SIGCOMM Computer Communication Review
Promoting the use of end-to-end congestion control in the Internet
IEEE/ACM Transactions on Networking (TON)
ACM SIGCOMM Computer Communication Review
An analysis of using reflectors for distributed denial-of-service attacks
ACM SIGCOMM Computer Communication Review
A randomized online algorithm for bandwidth utilization
SODA '02 Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete algorithms
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Design guidelines for robust Internet protocols
ACM SIGCOMM Computer Communication Review
Robustness of multicast congestion control to inflated subscription
SIGMETRICS '03 Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Robustness to inflated subscription in multicast congestion control
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Measuring and analyzing the characteristics of Napster and Gnutella hosts
Multimedia Systems
ACM SIGCOMM Computer Communication Review
A Randomized Online Algorithm for Bandwidth Utilization
Journal of Scheduling
Cooperation Issues in Mobile Ad Hoc Networks
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Specification faithfulness in networks with rational nodes
Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing
Faithfulness in internet algorithms
Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems
New techniques for making transport protocols robust to corruption-based loss
ACM SIGCOMM Computer Communication Review
Explicit transport error notification (ETEN) for error-prone wireless and satellite networks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Networking for the earth science
Measuring the evolution of transport protocols in the internet
ACM SIGCOMM Computer Communication Review
Tussle in cyberspace: defining tomorrow's internet
IEEE/ACM Transactions on Networking (TON)
Selfish MAC Layer Misbehavior in Wireless Networks
IEEE Transactions on Mobile Computing
WebSOS: an overlay-based system for protecting web servers from denial of service attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Misbehaving TCP receivers can cause internet-wide congestion collapse
Proceedings of the 12th ACM conference on Computer and communications security
Oasis: an overlay-aware network stack
ACM SIGOPS Operating Systems Review
Designing DCCP: congestion control without reliability
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Design of multicast protocols robust against inflated subscription
IEEE/ACM Transactions on Networking (TON)
Computer Networks: The International Journal of Computer and Telecommunications Networking
Trickles: a stateless network stack for improved scalability, resilience, and flexibility
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
System support for bandwidth management and content adaptation in internet applications
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Alpine: a user-level infrastructure for network protocol development
USITS'01 Proceedings of the 3rd conference on USENIX Symposium on Internet Technologies and Systems - Volume 3
Protecting TCP from a misbehaving receiver
International Journal of Network Management
A stateless approach to connection-oriented protocols
ACM Transactions on Computer Systems (TOCS)
Rd network services: differentiation through performance incentives
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
An analysis of security threats to mobile IPv6
International Journal of Internet Protocol Technology
Employing cross-layer assisted TCP algorithms to improve TCP performance with vertical handoffs
International Journal of Communication Networks and Distributed Systems
Auto-protection of 802.11 networks from TCP ACK division
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Symbiotic relationships in internet routing overlays
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
WebSOS: an overlay-based system for protecting web servers from denial of service attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
On remote exploitation of TCP sender for low-rate flooding denial-of-service attack
IEEE Communications Letters
Enforcing layered multicast congestion control using ECN-nonce
Computer Networks: The International Journal of Computer and Telecommunications Networking
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
CRAFT: a new secure congestion control architecture
Proceedings of the 17th ACM conference on Computer and communications security
Reliability and congestion control for VoIP signalling transport
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Finding protocol manipulation attacks
Proceedings of the ACM SIGCOMM 2011 conference
DefenestraTor: throwing out windows in Tor
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Efficient defence against misbehaving TCP receiver DoS attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Forensic investigation of the OneSwarm anonymous filesharing system
Proceedings of the 18th ACM conference on Computer and communications security
Is it still possible to extend TCP?
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
TCP based denial-of-service attacks to edge network: analysis and detection
CIT'04 Proceedings of the 7th international conference on Intelligent Information Technology
SCTP over high speed wide area networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part I
Reproducible network experiments using container-based emulation
Proceedings of the 8th international conference on Emerging networking experiments and technologies
Scap: stream-oriented network traffic capture and analysis for high-speed networks
Proceedings of the 2013 conference on Internet measurement conference
Hi-index | 0.00 |
In this paper, we explore the operation of TCP congestion control when the receiver can misbehave, as might occur with a greedy Web client. We first demonstrate that there are simple attacks that allow a misbehaving receiver to drive a standard TCP sender arbitrarily fast, without losing end-to-end reliability. These attacks are widely applicable because they stem from the sender behavior specified in RFC 2581 rather than implementation bugs. We then show that it is possible to modify TCP to eliminate this undesirable behavior entirely, without requiring assumptions of any kind about receiver behavior. This is a strong result: with our solution a receiver can only reduce the data transfer rate by misbehaving, thereby eliminating the incentive to do so.