Abstract
In this paper, we first show that various network attacks can cause fatal inflation of dynamic memory usage on packet processing computers. Considering Transmission Control Protocol (TCP) is utilized by most of these attacks as well as legitimate traffic, we propose a parsimonious memory management guideline based on the design of the TCP and the analysis of real-life Internet traces. In particular, we demonstrate that, for all practical purposes, one should not allocate memory for an embryonic TCP connection with roughly more than 10 seconds of inactivity.
Original language | English |
---|---|
Pages (from-to) | 238-240 |
Number of pages | 3 |
Journal | IEEE Transactions on Computers |
Volume | 54 |
Issue number | 2 |
DOIs | |
Publication status | Published - 2005 Feb |
Bibliographical note
Funding Information:This work was supported by Korea Telecom.
Keywords
- Memory management
- Network monitoring
- Packet inspection
- TCP
- Timeout
ASJC Scopus subject areas
- Software
- Theoretical Computer Science
- Hardware and Architecture
- Computational Theory and Mathematics