• TCP Timeout and Retransmission(5)


    Destination Metrics 

    Repacketization 

    When TCP times out and retransmits, it does not have to retransmit the identi- cal segment.

    Instead, TCP is allowed to perform repacketization, sending a bigger segment, which can increase performance. (Naturally, this bigger segment cannot exceed the MSS announced by the receiver and should not exceed the path MTU.)

    This is allowed in the protocol because TCP identifies the data being sent and acknowledged by its byte number, not its segment (or packet) number. 

    Attacks Involving TCP Retransmission 

    There is a class of DoS attack called low-rate DoS attacks [KK03].

    In such an attack, an attacker sends bursts of traffic to a gateway or host, causing the victim sys- tem to experience a retransmission timeout.

    Given an ability to predict when the victim TCP will attempt to retransmit, the attacker generates a burst of traffic at each retransmission attempt.

    As a consequence, the victim TCP perceives conges- tion in the network, throttles its sending rate to near zero, keeps backing off its RTO according to Karn’s algorithm, and effectively receives very little network throughput.

    The proposed mechanism to deal with this type of attack is to add randomization to the RTO, making it difficult for the attacker to guess the precise times when a retransmission will take place. 

    Summary

  • 相关阅读:
    《NoSQL精粹》读书笔记
    react+flux编程实践(一) 基础篇
    MongoDB索引(一) --- 入门篇:学习使用MongoDB数据库索引
    (译+注解)node.js的C++扩展入门
    深入解析Javascript异步编程
    (译)package.json详解
    Protobuf学习
    Redis学习
    MySQL学习-常用命令整理
    TCP/IP-TCP
  • 原文地址:https://www.cnblogs.com/geeklove01/p/9747763.html
Copyright © 2020-2023  润新知