{"title":"Linux下TCP持久定时器的漏洞及解决方案","authors":"Man-sha Lu","doi":"10.1109/ITAPP.2010.5566250","DOIUrl":null,"url":null,"abstract":"As a current main end-to-end communication protocol there are a few vulnerabilities in TCP specification. The paper discusses the theory and vulnerability of TCP persist timer and analyzes the implementation of it in Linux. The vulnerability can lead to the infamous DOS attack. In the end of the paper we give two solutions to defense this type of DOS attack through modifying Linux kernel codes or through application implementation.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"97 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Vulnerability and Solution of TCP Persistent Timer in Linux\",\"authors\":\"Man-sha Lu\",\"doi\":\"10.1109/ITAPP.2010.5566250\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As a current main end-to-end communication protocol there are a few vulnerabilities in TCP specification. The paper discusses the theory and vulnerability of TCP persist timer and analyzes the implementation of it in Linux. The vulnerability can lead to the infamous DOS attack. In the end of the paper we give two solutions to defense this type of DOS attack through modifying Linux kernel codes or through application implementation.\",\"PeriodicalId\":116013,\"journal\":{\"name\":\"2010 International Conference on Internet Technology and Applications\",\"volume\":\"97 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-09-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Internet Technology and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITAPP.2010.5566250\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Internet Technology and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITAPP.2010.5566250","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Vulnerability and Solution of TCP Persistent Timer in Linux
As a current main end-to-end communication protocol there are a few vulnerabilities in TCP specification. The paper discusses the theory and vulnerability of TCP persist timer and analyzes the implementation of it in Linux. The vulnerability can lead to the infamous DOS attack. In the end of the paper we give two solutions to defense this type of DOS attack through modifying Linux kernel codes or through application implementation.