Related Work Flashcards
TCP Extensions for Transactions (T/TCP),
bypasses TCP’s connection handshake, and thus shares both the goals and the challenges of TFO
TFO’s vulnerability to SYN flood attacks is no different from unmodified TCP,
the damage an attacker can inflict upon the server may be much worse, and thus deserves careful consideration.
the best defense when a host is suspected to be under a SYN flood attack (e.g. when the SYN backlog is filled)
is simply to disable TFO
Once TFO is disabled
normal SYN flood defenses can be employed
primarily designed to eliminate server state during the initial handshake and to de- fend from spoofed DoS attacks
TCPCT
TCPCT
also allows SYN and SYN-ACK pack- ets to carry data
TFO allows the server to respond to data
during the handshake even after the SYN-ACK is sent.
PRECONNECT
Chrome and Internet Explorer 9 maintain a history of the do- mains for frequently visited web pages. The browsers then speculatively pre-open TCP connections to these domains before the user initiates any requests for them