Protection mechanisms for well-behaved TCP flows from tampered-TCP at edge routers

Junichi Maruyama, Go Hasegawa, Masayuki Murata

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In this paper, we propose a new mechanism which detects tampered-TCP connections at edge routers and protects well-behaved TCP connections from the tampered-TCP connections, resulting in maintaining the fairness amongst TCP connections. The proposed mechanism monitors the TCP packets at an edge router and estimates the window size or the throughput for each TCP connection. By using estimation results, the proposed mechanism assesses whether each TCP connection is tampered or not and drops packets intentionally if necessary to improve the fairness amongst TCP connections. From the results of simulation experiments, we exhibit that the proposed mechanism can accurately identify tampered-TCP connections. We also show that the proposed mechanism can regulate throughput ratio between tampered-TCP connections and competing TCP Reno connections to about 1.

Original languageEnglish
Title of host publicationProceedings of 16th International Conference on Computer Communications and Networks 2007, ICCCN 2007
Pages340-345
Number of pages6
DOIs
Publication statusPublished - 2007 Dec 1
Externally publishedYes
Event16th International Conference on Computer Communications and Networks 2007, ICCCN 2007 - Honolulu, HI, United States
Duration: 2007 Aug 132007 Aug 16

Publication series

NameProceedings - International Conference on Computer Communications and Networks, ICCCN
ISSN (Print)1095-2055

Conference

Conference16th International Conference on Computer Communications and Networks 2007, ICCCN 2007
CountryUnited States
CityHonolulu, HI,
Period07/8/1307/8/16

Keywords

  • Congestion window
  • Fairness
  • Network monitoring
  • Tampered-TCP
  • Transmission Control Protocol (TCP)

ASJC Scopus subject areas

  • Computer Science(all)

Fingerprint Dive into the research topics of 'Protection mechanisms for well-behaved TCP flows from tampered-TCP at edge routers'. Together they form a unique fingerprint.

Cite this