Securing TCP/IP Stacks Using IP Tables
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 3)Publication Date: 2015-03-05
Authors : Hamisu I. Usman; J. Dharani;
Page : 2049-2054
Keywords : TCP/IP; DoS; Sniffing; Internet; Flooding;
Abstract
- The Transmission Control Protocol/Internet Protocol (TCP/IP) suite has become a widely method of interconnecting hosts, networks, and the internet at large. The TCP/IP protocol suite is vulnerable to a variety of attacks ranging from password sniffing to devastating attacks such as denial of service (DoS), and one thing that makes this attack successful is that most of the software uses to carry out those type of attacks are freely available on the internet. A DoS attack is an attempt by an attacker to flood a users or an organizations system. There are two main categories of DoS attacks. DoS attacks can be either sent by a single system to a single target (simple DoS) or sent by many systems to a single target (DDoS). The goal of DoS isnt to gain unauthorized access to machines or data, but to prevent legitimate users of a service from using it.
Other Latest Articles
- New Secure and Advanced Algorithm for Stream Ciphers Extended RC4 and FPGA Implementation
- An Efficient Method for Image Denoising Using Orthogonal Wavelet Transform
- Using Internet: Technical and Health related Problems in Users
- A Review on Various Fusion and Features Extraction Approaches for Multi-Modal Biometric Authentication System
- Big Data Analytics for Gold Price Forecasting Based on Decision Tree Algorithm and Support Vector Regression (SVR)
Last modified: 2021-06-30 21:34:49