会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • PREVENTING NETWORK DATA INJECTION ATTACKS
    • 防止网络数据注入攻击
    • WO2005072117A3
    • 2005-12-22
    • PCT/US2005001018
    • 2005-01-11
    • CISCO TECH INDRAMAIAH ANANTHASTEWART RANDALLLEI PETERMAHAN PATRICK
    • RAMAIAH ANANTHASTEWART RANDALLLEI PETER
    • G06F11/30G06F15/173H04L9/00H04L9/32H04L12/56H04L29/06
    • H04L63/1416H04L47/27H04L47/29H04L47/323H04L47/34H04L63/1458H04L69/16H04L69/163
    • Approaches for preventing TCP data injection attacks in packet-switched networks are disclosed. A first approach provides for dropping received segments that carry ACK values smaller than the next unacknowledged sequence number expected minus the maximum window size. This approach helps keep spurious injected segments out of the TCP re-assembly buffer. In a second approach, heuristics are used to examine the sequence number of a newly arrived segment, and when the sequence number is the next expected, then the newly arrived segment is used and the contents of the re-assembly buffer are not considered. Further, if the data payload of the newly arrived segment overlaps in sequential order with segments already in the re-assembly buffer, the overlapped segments in the re-assembly buffer are considered spurious and are discarded. Thus, this approach helps remove spurious data from the re-assembly buffer if the first approach somehow fails to prevent the data from entering the re-assembly buffer.
    • 公开了在分组交换网络中防止TCP数据注入攻击的方法。 第一种方法提供丢弃接收的段,其携带ACK值小于预期的下一个未确认序列号减去最大窗口大小。 这种方法有助于将伪注入的段保留在TCP重新组装缓冲区之外。 在第二种方法中,启发式用于检查新到达的段的序列号,当序列号是下一个预期序列号时,则使用新到达的段,并且不考虑重新组装缓冲区的内容。 此外,如果新到达的段的数据有效载荷与已经在重新组装缓冲区中的段按顺序重叠,则重组缓冲区中的重叠段被认为是虚假的并被丢弃。 因此,如果第一种方法无法防止数据进入重新组装缓冲区,则此方法有助于从重新组装缓冲区中清除虚假数据。