Preventing session table explosion in packet inspection computers

Hyogon Kim, Jin Ho Kim, Inhye Kang, Saewoong Bahk

    Research output: Contribution to journalArticlepeer-review

    19 Citations (Scopus)

    Abstract

    In this paper, we first show that various network attacks can cause fatal inflation of dynamic memory usage on packet processing computers. Considering Transmission Control Protocol (TCP) is utilized by most of these attacks as well as legitimate traffic, we propose a parsimonious memory management guideline based on the design of the TCP and the analysis of real-life Internet traces. In particular, we demonstrate that, for all practical purposes, one should not allocate memory for an embryonic TCP connection with roughly more than 10 seconds of inactivity.

    Original languageEnglish
    Pages (from-to)238-240
    Number of pages3
    JournalIEEE Transactions on Computers
    Volume54
    Issue number2
    DOIs
    Publication statusPublished - 2005 Feb

    Bibliographical note

    Funding Information:
    This work was supported by Korea Telecom.

    Keywords

    • Memory management
    • Network monitoring
    • Packet inspection
    • TCP
    • Timeout

    ASJC Scopus subject areas

    • Software
    • Theoretical Computer Science
    • Hardware and Architecture
    • Computational Theory and Mathematics

    Fingerprint

    Dive into the research topics of 'Preventing session table explosion in packet inspection computers'. Together they form a unique fingerprint.

    Cite this