; --------------------------------------------------------------------- ; To submit, log into grace.umd.edu and use the following command: ; /submit 2015 fall 0101 19 internet_protocols.bib ; --------------------------------------------------------------------- ; Required Readings @INPROCEEDINGS{ Sherwood05, title = {Misbehaving {TCP} receivers can cause internet-wide congestion collapse}, author = {Rob Sherwood and Bobby Bhattacharjee and Ryan Braud}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, bdsk-url-2 = {http://dx.doi.org/10.1145/1102120.1102170}, url = {http://doi.acm.org/10.1145/1102120.1102170}, doi = {10.1145/1102120.1102170}, crossref = {DBLP:conf/ccs/2005}, abstract = {An optimistic acknowledgment (opt-ack) is an acknowledgment sent by a misbehaving client for a data segment that it has not received. Whereas previous work has focused on opt-ack as a means to greedily improve end-to-end performance, we study opt-ack exclusively as a denial of service attack. Specifically, an attacker sends optimistic acknowledgments to many victims in parallel, thereby amplifying its effective bandwidth by a factor of 30 million (worst case). Thus, even a relatively modest attacker can totally saturate the paths from many victims back to the attacker. Worse, a distributed network of compromised machines (zombies) attacking in parallel can exploit over-provisioning in the Internet to bring about wide-spread, sustained congestion collapse.We implement this attack both in simulation and in a wide-area network, and show it severity both in terms of number of packets and total traffic generated. We engineer and implement a novel solution that does not require client or network modifications allowing for practical deployment. Additionally, we demonstrate the solution's efficiency on a real network.}, year = {2005}, pages = {383--392}, studentfirstname ={}, studentlastname ={}, summary = {}, contribution1 ={}, contribution2 ={}, contribution3 ={}, contribution4 ={}, contribution5 ={}, weakness1 = {}, weakness2 = {}, weakness3 = {}, weakness4 = {}, weakness5 = {}, interesting = {high/med/low}, opinions = {}, } ; BibTex cross-references (don't add anything here) @PROCEEDINGS{ DBLP:conf/ccs/2005, title = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, isbn = {1-59593-226-7}, publisher = {{ACM}}, year = {2005}, }