Security Problems and Their Defenses in TCP/IP Protocol Suite
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 9
Abstract
The Transmission Control Protocol/Internet Protocol (TCP/IP) is combination of different protocols at various layers.TCP/IP is the basic communication language or protocol of the Internet and private networks either an intranet or an extranet. The TCP/IP suite has many design weaknesses so far as security and privacy are concerned. Some of these are protocol design weaknesses, whereas rest is defects in the software that implements the protocols. In this paper, I focused mainly on protocol level issues, rather than implementation flaws. In this paper, we discuss about the security issues related to the some of the protocols in the TCP/IP suite.
Authors and Affiliations
Shubham Kumar, Vishal Sharma, Shubham Chabbra, Toshar Namsot
slugA Survey on Image Retargeting Techniques
The technique of adapting images to display devices with various as pect ratios and sizes is called image retargeting. The key requirement behind content aware retargeting is to minimize v...
Intelligent Train Engine and Running System
This paper is an attempt to improve the currently running railway system by automation of the rail engine and the unmanned railway crossing gates. This system is designed to automatically change speed in accordance to t...
Brief Review of Max-Min Ant System based Focussed Crawler
A focused crawler is Web crawler that traverses the Web to explore information that is related to a particular topic of interest only. This study, aims to find the Indian academicians webpages from foreign universities...
Data Integrity and Delay Differentiated Routing (IDDR) Services in Wireless Sensor Networks (WSN’s)
Applications running on the same Wireless Sensor Network (WSN) platform usually have different Quality of Service (QoS) requirements. Two basic requirements are low delay and high data integrity. However, in most situat...
Enhanced authentication based security using TDES and MD5
For secure authentication over the internet and secure data transfer purposed using cryptography technique which provide high security. Encryption of an image, audio encryption, chaos based encryption contain various ap...