Abstract
In this paper, we first show that various network attacks can cause fatal inflation of dynamic memory usage on packet processing computers. Considering Transmission Control Protocol (TCP) is utilized by most of these attacks as well as legitimate traffic, we propose a parsimonious memory management guideline based on the design of the TCP and the analysis of real-life Internet traces. In particular, we demonstrate that, for all practical purposes, one should not allocate memory for an embryonic TCP connection with roughly more than 10 seconds of inactivity.
| Original language | English |
|---|---|
| Pages (from-to) | 238-240 |
| Number of pages | 3 |
| Journal | IEEE Transactions on Computers |
| Volume | 54 |
| Issue number | 2 |
| DOIs | |
| State | Published - Feb 2005 |
Keywords
- Memory management
- Network monitoring
- Packet inspection
- TCP
- Timeout
Fingerprint
Dive into the research topics of 'Preventing session table explosion in packet inspection computers'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver