Abstract
In this paper, we first show that various network attacks can cause fatal inflation of dynamic memory usage on packet processing computers. Considering Transmission Control Protocol (TCP) is utilized by most of these attacks as well as legitimate traffic, we propose a parsimonious memory management guideline based on the design of the TCP and the analysis of real-life Internet traces. In particular, we demonstrate that, for all practical purposes, one should not allocate memory for an embryonic TCP connection with roughly more than 10 seconds of inactivity.
Original language | English |
---|---|
Pages (from-to) | 238-240 |
Number of pages | 3 |
Journal | IEEE Transactions on Computers |
Volume | 54 |
Issue number | 2 |
DOIs | |
State | Published - Feb 2005 |
Keywords
- Memory management
- Network monitoring
- Packet inspection
- TCP
- Timeout