"We introduce the notion of a Spoofing Set as a way of describing a generalized attack methodology. We also discuss a method of constructing Spoofing Sets that is based on Phase Space Analysis and the presence of function attractors. We review the major network operating systems relative to this attack." This is a fun paper. How random IS your PRNG? Strange Attractors and TCP/IP Sequence Number Analysis |