메뉴 건너뛰기




Volumn , Issue , 2012, Pages 347-361

Off-path TCP sequence number inference attack: How firewall middleboxes reduce security

Author keywords

Firewall middleboxes; TCP connection hijack; TCP sequence number inference

Indexed keywords

COMPUTER SYSTEM FIREWALLS; HTTP; TRANSMISSION CONTROL PROTOCOL;

EID: 84878347923     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2012.29     Document Type: Conference Paper
Times cited : (79)

References (35)
  • 5
    • 84878350743 scopus 로고    scopus 로고
    • Retrieved on 03/04/2012
    • Comet (programming). http://en.wikipedia.org/wiki/Comet-(programming), Retrieved on 03/04/2012.
    • Comet (Programming)
  • 9
    • 85175134262 scopus 로고    scopus 로고
    • Retrieved on 03/04/2012
    • TCP hijacking video demo. http://youtu.be/T65lQtgUJ2Y, Retrieved on 03/04/2012.
    • TCP Hijacking Video Demo
  • 10
    • 85175132428 scopus 로고    scopus 로고
    • Retrived on 03/04/2012
    • Access Point Name. http://en.wikipedia.org/wiki/Access Point Name, Retrived on 03/04/2012.
    • Access Point Name
  • 11
    • 84870649449 scopus 로고    scopus 로고
    • Retrived on 03/04/2012
    • MSN Messenger Protocol. http://www.hypothetic.org/docs/msn/, Retrived on 03/04/2012.
    • MSN Messenger Protocol
  • 12
    • 21644452807 scopus 로고    scopus 로고
    • A Look Back at "Security Problems in the TCP/IP Protocol Suite"
    • S. M. Bellovin. A Look Back at "Security Problems in the TCP/IP Protocol Suite". In ACSAC, 2004.
    • (2004) ACSAC
    • Bellovin, S.M.1
  • 15
    • 85175131574 scopus 로고    scopus 로고
    • 8.2 Retrieved on 03/04/2012
    • Cisco. Cisco ASA 5500 Series Configuration Guide using the CLI, 8.2. http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns tcpnorm.html, Retrieved on 03/04/2012.
    • Cisco ASA 5500 Series Configuration Guide Using the CLI
  • 21
    • 34548765812 scopus 로고    scopus 로고
    • Juniper Retrieved on 03/04/2012
    • Juniper. Stateful Inspection Firewalls. http://www.abchost.sk/download/ 204-4/juniper-stateful-inspection-firewall.pdf, Retrieved on 03/04/2012.
    • Stateful Inspection Firewalls
  • 23
    • 84870632676 scopus 로고    scopus 로고
    • Retrieved on 03/04/2012
    • G. LEECH, P. RAYSON, and A. WILSON. Procfs Analysis. http://www.nsa.gov/ research/ files/selinux/papers/slinux/node57.shtml, Retrieved on 03/04/2012.
    • Procfs Analysis
    • Leech, G.1    Rayson, P.2    Wilson, A.3
  • 24
    • 85175130200 scopus 로고    scopus 로고
    • Blind TCP/IP hijacking is still alive
    • lkm
    • lkm. Blind TCP/IP hijacking is still alive. In Phrack Magazine, issue 64, 2007.
    • (2007) Phrack Magazine , Issue.64
  • 32
    • 80053141283 scopus 로고    scopus 로고
    • An Untold Stody of Middleboxes in Cellular Networks
    • Z. Wang, Z. Qian, Q. Xu, Z. M. Mao, and M. Zhang. An Untold Stody of Middleboxes in Cellular Networks. In SIGCOMM, 2011.
    • (2011) SIGCOMM
    • Wang, Z.1    Qian, Z.2    Xu, Q.3    Mao, Z.M.4    Zhang, M.5
  • 33
    • 58149088319 scopus 로고    scopus 로고
    • Slipping in the Window: TCP Reset Attacks
    • P. A. Watson. Slipping in the Window: TCP Reset Attacks. In CanSecWest, 2004.
    • (2004) CanSecWest
    • Watson, P.A.1
  • 34
    • 84883298692 scopus 로고    scopus 로고
    • Cellular Data Network Infrastructure Characterization and Implication on Mobile Content Placement
    • Q. Xu, J. Huang, Z. Wang, F. Qian, A. Gerber, and Z. M. Mao. Cellular Data Network Infrastructure Characterization and Implication on Mobile Content Placement. In Proc. ACM SIGMETRICS, 2011.
    • Proc. ACM SIGMETRICS, 2011
    • Xu, Q.1    Huang, J.2    Wang, Z.3    Qian, F.4    Gerber, A.5    Mao, Z.M.6
  • 35
    • 79959957319 scopus 로고    scopus 로고
    • Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems
    • K. Zhang and X. Wang. Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems. In Proc. of USENIX Security Symposium, 2009.
    • Proc. of USENIX Security Symposium, 2009
    • Zhang, K.1    Wang, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.