 |
Mark Allman. Comments On Selecting Ephemeral Ports, ACM Computer Communication Review, 39(2), April 2009.
PDF
Abstract:
Careless selection of the ephemeral port number portion of a
transport protocol's connection identifier has been shown to
potentially degrade security by opening the connection up to
injection attacks from ``blind'' or ``off path'' attackers---or,
attackers that cannot directly observe the connection. This short
paper empirically explores a number of algorithms for choosing the
ephemeral port number that attempt to obscure the choice from such
attackers and hence make mounting these blind attacks more
difficult.
BibTeX:
@article{All09,
author = "Mark Allman",
title = "{Comments On Selecting Ephemeral Ports}",
journal = "ACM Computer Communication Review",
year = 2009,
volume = 39,
number = 2,
month = apr,
}
|
|