Characteristics of wide-area TCP/IP conversations
SIGCOMM '91 Proceedings of the conference on Communications architecture & protocols
sendmail
Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
Practical Unix and Internet security (2nd ed.)
Practical Unix and Internet security (2nd ed.)
Security problems in the TCP/IP protocol suite
ACM SIGCOMM Computer Communication Review
Internet Firewalls and Network Security
Internet Firewalls and Network Security
A Simple active attack against TCP
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
Secure RPC authentication (SRA) for TELNET and FTP
usenix-ss'93 Proceedings of the 4th conference on UNIX security symposium - Volume 4
The TAMU security package: an ongoing response to internet intruders in an academic environment
usenix-ss'93 Proceedings of the 4th conference on UNIX security symposium - Volume 4
Network system and world wide web security
Computer Communications
Tutorial: Internet/Intranet firewall security-policy, architecture and transaction services
Computer Communications
TOS: kernel support for distributed systems management
Proceedings of the 2001 ACM symposium on Applied computing
Security‐enhanced packet video with dynamic multicast throughput adjustment
International Journal of Network Management
Detection and Protection Against Network Scanning: IEDP
ICCNMC '01 Proceedings of the 2001 International Conference on Computer Networks and Mobile Computing (ICCNMC'01)
Security in wireless mobile and sensor networks
Wireless communications systems and networks
Enhanced of key agreement protocols resistant to a denial-of-service attack
Fundamenta Informaticae
Characterizing network traffic by means of the NetMine framework
Computer Networks: The International Journal of Computer and Telecommunications Networking
Lightweight opportunistic tunneling (LOT)
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Data reduction by identification and correlation of TCP/IP attack attributes for network forensics
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
The design of data-link equipment redundant strategy
ICONIP'06 Proceedings of the 13th international conference on Neural information processing - Volume Part III
A new method of network data link troubleshooting
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Neural network based flow forecast and diagnosis
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
LOT: A Defense Against IP Spoofing and Flooding Attacks
ACM Transactions on Information and System Security (TISSEC)
Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack
Fundamenta Informaticae
Practical verification of WPA-TKIP vulnerabilities
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Hi-index | 0.24 |
The TCP/IP protocol suite is vulnerable to a variety of attacks ranging from password sniffing to denial of service. Software to carry out most of these attacks is freely available on the Internet. These vulnerabilities-unless carefully controlled-can place the use of the Internet or intranet at considerable risk. This article classifies a range of known attack methods focusing in particular on SYN flooding, IP spoofing, TCP sequence number attack, TCP session hijacking, RST and FIN attacks and the Ping O' Death. The article concludes with an examination of the vulnerabilities of the common protocols carried by TCP/IP (including SMTP, Telnet, NTP, Finger, NFS, FTP, WWW and X windows) and proposes configuration methods to limit their vulnerability.