Securing TCP/IP Stacks Using IP Tables
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3
Abstract
Abstract - The Transmission Control Protocol/Internet Protocol (TCP/IP) suite has become a widely method of interconnecting hosts, networks, and the internet at large. The TCP/IP protocol suite is vulnerable to a variety of attacks ranging from password sniffing to devastating attacks such as denial of service (DoS), and one thing that makes this attack successful is that most of the software uses to carry out those type of attacks are freely available on the internet. A DoS attack is an attempt by an attacker to flood a user’s or an organization’s system. There are two main categories of DoS attacks. DoS attacks can be either sent by a single system to a single target (simple DoS) or sent by many systems to a single target (DDoS). The goal of DoS isn’t to gain unauthorized access to machines or data, but to prevent legitimate users of a service from using it.
Separation of Cs-Sr through Ultrafiltration
Complexation - ultrafiltration is a new technique which can be used for the absolute separation of trace elements. We have attempted to separate a mixed metal system to their individual components using the technique. Th...
Estimation of a Co-integration Model Using Ordinary Least Squares (A Simulation Study)
"Generalized AutoRegressive Conditional Heteroskedasticity (GARCH) models are usually used to analyse time series data with high volatility clustering. In this paper, it is proposed that if two time series follow GARCH(1...
Accessory Soleus - A Case Report
Accessory muscles are anatomic variants representing additional distinct muscles that are encountered along with the normal complement of muscles1. In the vast majority of cases, accessory muscles are asymptomatic and re...
Enteric Fever Presenting as Hemolytic Uremic Syndrome
Hemolytic uremic syndrome is usually caused by toxigenic strains of E.coli or Shigella. HUS due to Salmonella typhi is a rare presentation. We present a seven year old child with diarrhea followed by microangiopathic hem...
A Review Paper on Crack Detection and Restoration of Old Painting
Everyday digital image processing is used in all areas of science. With the help of image processing tools, various digital image processing can be applied for restoration of old painting. Ancient paintings are cultural...