In this paper, we explore the operation of TCP congestion control when the receiver can misbehave, as might occur with a greedy Web client. We first demonstrate that there are simple attacks that allow a misbehaving receiver to drive a standard TCP sender arbitrarily fast, without losing end-to-end reliability. These attacks are widely applicable because they stem from the sender behavior specified in RFC 2581 rather than implementation bugs. We then show that it is possible to modify TCP to eliminate this undesirable behavior entirely, without requiring assumptions of any kind about receiver behavior. This is a strong result: with our solution a receiver can only reduce the data transfer rate by misbehaving, thereby eliminating the incentive to do so.
CITATION STYLE
Savage, S., Cardwell, N., Wetherall, D., & Anderson, T. (1999). TCP congestion control with a misbehaving receiver. Computer Communication Review, 29(5), 71–78. https://doi.org/10.1145/505696.505704
Mendeley helps you to discover research relevant for your work.