An attacker can send TCP packets to Windows, in order to trigger a denial of service. By manipulating the state of a TCP connection, an attacker
could force the TCP connection to remain in a long-lived state, possibly
indefinitely. If enough TCP connections are forced into a long-lived or
indefinite state, resources on a system under attack may be consumed,
preventing new TCP connections from being accepted (Radhakrishnan, Cheng, Chu, Jain, & Raghavan, 2011).
The mitigation steps include the implementation of an IP security that will be in a psostion to encrypt traffic at the network layer. secondly should be the reduction of the TCP window size and finally failing to publish TCP source port information (Radhakrishnan, Cheng, Chu, Jain, & Raghavan, 2011).
Radhakrishnan, S., Cheng, Y., Chu, J., Jain, A., & Raghavan, B. (2011, December). TCP fast open. In Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies (p. 21). ACM.
Content will be erased after question is completed.