Research on Off-Path Exploits of Network Protocols

Falin Hou, Xiao Yu*, Kefan Qiu, Junli Liu, Zhiwei Shi, Yuanzhang Li

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

With the rapid development of the Internet industry, from a global perspective, the risks brought by network security are becoming increasingly prominent, and continue to penetrate into political, economic, cultural, social, national defense and other fields. Network security has attracted more and more researchers’ attention. This paper first analyzes the two types of network protcol attacks, reviews the development history and current status of off-path attacks, analyzes and summarizes the domestic and foreign literature from the morris TCP injection attacks inwa 1985 to the present. Finally, relying upon the reviewed work, we prospect the future development direction and research focus of off-path attacks.

Original languageEnglish
Title of host publicationData Mining and Big Data - 6th International Conference, DMBD 2021, Proceedings
EditorsYing Tan, Yuhui Shi, Albert Zomaya, Hongyang Yan, Jun Cai
PublisherSpringer Science and Business Media Deutschland GmbH
Pages73-80
Number of pages8
ISBN (Print)9789811674754
DOIs
Publication statusPublished - 2021
Event6th International Conference on Data Mining and Big Data, DMBD 2021 - Guangzhou, China
Duration: 20 Oct 202122 Oct 2021

Publication series

NameCommunications in Computer and Information Science
Volume1453 CCIS
ISSN (Print)1865-0929
ISSN (Electronic)1865-0937

Conference

Conference6th International Conference on Data Mining and Big Data, DMBD 2021
Country/TerritoryChina
CityGuangzhou
Period20/10/2122/10/21

Keywords

  • Network security
  • Off-path
  • Protocol

Fingerprint

Dive into the research topics of 'Research on Off-Path Exploits of Network Protocols'. Together they form a unique fingerprint.

Cite this