Mitigating Reordering Vulnerability of MPTCP With Transparent Proxies


Ayar T. , Budzisz L., Rathke B.

22nd International Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), Paris, France, 18 - 21 February 2019, pp.206-213 identifier identifier

  • Publication Type: Conference Paper / Full Text
  • Doi Number: 10.1109/icin.2019.8685908
  • City: Paris
  • Country: France
  • Page Numbers: pp.206-213

Abstract

Modern end-hosts are generally equipped with more than one network interfaces. IETF responded to proliferation of multi-homed end-hosts and proposed MPTCP to allow concurrent use of multiple interfaces in data transfers. Basically, MPTCP uses regular TCP flows (called as MPCTP subflows) to send/receive application data over multiple paths. This approach benefits from the strengths of TCP (e.g., its high deployment), but also suffers from its weaknesses (e.g., its vulnerability to reorderings).