Internet Key Exchange Clogging Attack

227 Words1 Page

One issue which could plague Internet Key Exchange is the clogging attack. The clogging attack occurs when an attacker uses forged IP addresses to initiate many (thousands) connections which stay in the open state for a period of time, which ties up the target system’s resources. To combat the clogging attack the Cookie Exchange was adopted from the Photuris Session Key Management Protocol created by Phil Karn. The cookie exchange occurs when a cookie request is sent from the initiator to the responder and the responder sends a cookie response to the initiator. The cookie is generally a hash of the source and destination IP addresses and port numbers along with a secret value created locally. The term “cookie” was derived from the term

More about Internet Key Exchange Clogging Attack

Open Document