Introduction to TCP/IP Network Attacks

نویسنده

  • Guang Yang
چکیده

Computation model has experienced a significant change since the emergence of the computer networks, which brought us much benefit that is difficult or even impossible to achieve by the traditional centralized system, such as resource sharing, high reliability, better price/performance ratio, and so on. Meanwhile, there also come many potential threats to the network community like unauthorized access to private information, malicious break-in to other organizations’ systems, or intent to render a system to make it unreliable or unusable. Network attacks generally adopt computer networks as transportation media to convey the intrusion or even attack the communication system itself. We will put our focus mainly on the network attacks happened around the TCP/IP (Transmission Control Protocol/Internet Protocol) protocol suite, which is the most widely used communication protocol and the de facto standard among the Internet society. KEYWORD: Network Attack, TCP/IP.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

TCP/IP Attacks, Defenses and Security Tools

The TCP/IP protocol suite is the foundation of Internet and is ubiquitous in almost all networks worldwide. It was written as a robust protocol, which is able to communicate despite node failures. The design parameters of TCP did not weigh security as important and placed an implicit trust on nodes. The result was a protocol which was reliable and robust, but contained myriad inherent security ...

متن کامل

Layered Security Framework for Intrusion Prevention

Internet provides huge information and value to the users but at the same time access to the internet is prone to increasing number of attacks. Due to vulnerabilities in the network system, protecting network from malicious activities is prime concern today. It is important to analyse vulnerabilities and record them so that future attacks can be predicted. In this paper vulnerabilities which ex...

متن کامل

Hacking Techniques in Wired Networks

Introduction Principles of Hacking Seven Steps of Hacking Overview of Hacking Toolkits Classifications of Hacking Toolkits Attacks against the Internet Infrastructure Attacks against DNS Attacks against TCP/IP Attacks against BGP Attacks against End Systems of the Internet Morris Worm Melissa Sadmind Code Red I and Code Red II Nimda SQL Slammer W32/Blaster Attacks against Enterprise Network Sys...

متن کامل

Modeling TCP/IP Networks Topology for Network Vulnerability Analysis Modeling TCP/IP Networks Topology for Network Vulnerability Analysis

The distributed nature and complexity of computer networks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to provide a simple, open communication infrastructure in an academic and collaborative environment, causes this protocol lack of built-in mechanisms for authentication, integrity and ...

متن کامل

Tracing Network Attacks to Their Sources

As the Internet becomes increasingly important as a business infrastructure, the number of attacks on it, especially denial-of-service attacks such as TCP SYN flooding,1 Teardrop,2 and Land,2 grows. Because of the weak security in TCP/IP, we must take responsibility for protecting our own sites against network attacks. Although access-control technologies, such as firewalls, are commonly used t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998