Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_1d90dfbedc85df2bce501f8af10f5cc4 |
classificationCPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L69-16 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L47-323 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L47-27 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L47-34 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L47-29 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L69-163 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1458 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1416 |
classificationIPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L12-56 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-32 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F11-30 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F15-173 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L29-06 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00 |
filingDate |
2005-01-11-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_793d8d7f785931a0a5e4850579a3c50d http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_851a79e9419ab755aba693367268310a http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_b8d7df3c277cf4680ba1e5fede146715 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_c870fad5aa9ec1a78626710e42f36e57 |
publicationDate |
2006-10-04-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
EP-1706955-A2 |
titleOfInvention |
Preventing network data injection attacks |
abstract |
Approaches for preventing TCP data injection attacks in packet-switched networks are disclosed. A first approach provides for dropping received segments that carry ACK values smaller than the next unacknowledged sequence number expected minus the maximum window size. This approach helps keep spurious injected segments out of the TCP re-assembly buffer. In a second approach, heuristics are used to examine the sequence number of a newly arrived segment, and when the sequence number is the next expected, then the newly arrived segment is used and the contents of the re-assembly buffer are not considered. Further, if the data payload of the newly arrived segment overlaps in sequential order with segments already in the re-assembly buffer, the overlapped segments in the re-assembly buffer are considered spurious and are discarded. Thus, this approach helps remove spurious data from the re-assembly buffer if the first approach somehow fails to prevent the data from entering the re-assembly buffer. |
priorityDate |
2004-01-16-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |