FINDING · EVALUATION

Using TCP IPID side channels combined with SYN backlog state inference, the authors detect intentional packet drops between two arbitrary Internet hosts without controlling either host. The only requirements are a client with a globally incrementing IPID (~1% of IP space) and a server with an open port; an ARMA model handles autocorrelated noise.

From 2014-ensafi-detectingDetecting Intentional Packet Drops on the Internet via TCP/IP Side Channels · §2 · 2014 · Passive and Active Measurement Conference

Implications

Tags

censors
generic
techniques
measurement-platformip-blocking

Extracted by claude-sonnet-4-6 — review before relying.