高级检索
    吕艳丽 李肖坚 夏春和 刘书志. 初始序列号生成算法的安全性研究[J]. 计算机研究与发展, 2005, 42(11): 1940-1945.
    引用本文: 吕艳丽 李肖坚 夏春和 刘书志. 初始序列号生成算法的安全性研究[J]. 计算机研究与发展, 2005, 42(11): 1940-1945.
    Lü Yanli, Li Xiaojian, Xia Chunhe, and Liu Shuzhi. Research on the Security of Initial Sequence Number Generation Arithmetic[J]. Journal of Computer Research and Development, 2005, 42(11): 1940-1945.
    Citation: Lü Yanli, Li Xiaojian, Xia Chunhe, and Liu Shuzhi. Research on the Security of Initial Sequence Number Generation Arithmetic[J]. Journal of Computer Research and Development, 2005, 42(11): 1940-1945.

    初始序列号生成算法的安全性研究

    Research on the Security of Initial Sequence Number Generation Arithmetic

    • 摘要: 许多操作系统都采用了强健的TCP ISN生成算法,然而 TCP Reset攻击的成功率并非人们想象的只有1/2\+32.基于Paul Watson的滑动窗口TCP Reset攻击方法,并结合了混沌时间序列分析进行序列号猜测的技术,提出一种新的TCP Reset攻击方法来验证TCP ISN生成算法的安全性.在Windows操作系统下的实验结果表明,该方法增大了TCP Reset攻击的成功概率,攻击发送17个RST包在10ms之内即可断开目标TCP连接.目前操作系统的TCP ISN生成算法仍有很大安全风险.

       

      Abstract: Many operating systems have already adopted strong TCP ISN generation methods. However, the probability of successful TCP Reset attack is not only1/2\+32as people expected. Based on Paul Waston's “slipping in the window: TCP Reset attacks” method, and combined with the sequence number guessing technology which uses chaotic time series analysis, a new TCP Reset attack method is presented in this paper in order to validate the security of TCP ISN generation methods. The experiment results under Windows operating system indicate that this method increases the success probability of TCP Reset attack, and the attackers can terminatethe established TCP connection by sending only 17 RST packets in 10 ms. Present Operation Systems' TCP ISN generation methods still have serious security risk.

       

    /

    返回文章
    返回