@misc{rfc5961, series = {Request for Comments}, number = 5961, howpublished = {RFC 5961}, publisher = {RFC Editor}, doi = {10.17487/RFC5961}, url = {https://www.rfc-editor.org/info/rfc5961}, author = {Randall R. Stewart and Mitesh Dalal and Anantha Ramaiah}, title = {{Improving TCP's Robustness to Blind In-Window Attacks}}, pagetotal = 19, year = 2010, month = aug, abstract = {TCP has historically been considered to be protected against spoofed off-path packet injection attacks by relying on the fact that it is difficult to guess the 4-tuple (the source and destination IP addresses and the source and destination ports) in combination with the 32-bit sequence number(s). A combination of increasing window sizes and applications using longer-term connections (e.g., H-323 or Border Gateway Protocol (BGP) {[}STANDARDS-TRACK{]}}, }