This is archived content, mostly untouched since 2003. For newer content/updated versions, see netfuture.ch/Publications.
First page Back Continue Last page Overview Graphics

Summary


Notes:

Attacker Q (marked in cyan) can insert fake edges anywhere outside the cyan border encircling V.
A GOSSIB attack is hard to distinguish from real traceback information. In fact, we believe that any statistical method that can be applied to distinguish can be fooled. Even worse, putting in statistical analysis on the validity of attack edges or fragments will allow the attackers to remove real attack edges from the victim-reconstructed attack graph.