Securing TCP/IP Stacks Using IP Tables

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3

Abstract

Abstract - The Transmission Control Protocol/Internet Protocol (TCP/IP) suite has become a widely method of interconnecting hosts, networks, and the internet at large. The TCP/IP protocol suite is vulnerable to a variety of attacks ranging from password sniffing to devastating attacks such as denial of service (DoS), and one thing that makes this attack successful is that most of the software uses to carry out those type of attacks are freely available on the internet. A DoS attack is an attempt by an attacker to flood a user’s or an organization’s system. There are two main categories of DoS attacks. DoS attacks can be either sent by a single system to a single target (simple DoS) or sent by many systems to a single target (DDoS). The goal of DoS isn’t to gain unauthorized access to machines or data, but to prevent legitimate users of a service from using it.

Authors and Affiliations

Keywords

Related Articles

SII Model for Self-Start Detection on the Propagation Dynamics of Modern Email Malware

In recent years, email is the basic service for person to person communication, and email facilitates by its high speed, and process ability. The email malware exhibits two new propagation features; reinfection and self-...

Callus culture of Spilanthes paniculata (DC) Jansen- An Aromatic Medicinal plant

Spilanthes paniculata (DC) Jansen is an important medicinal plant with rich source of therapeutic and medicinal constituents of family Asteraceae. Callus culture of Spilanthes paniculata (DC) Jansen was established in Mu...

Customers Perception and Shopping Motivation at Organized Retail Outlets

Customers Perception and Shopping Motivation at Organized Retail Outlets

Effectiveness of Yoga Therapy (A Mind-Body Medicine) in Prevention and Management of Chronic Low Back Pain (CLBP): A Review Based on Evidence

"Back pain is an increasing economic and health problem affecting nearly 80% of the general population. Healthcare costs for low back pain (LBP) are increasing rapidly. Hence, it is important to provide effective and cos...

Data Security for Cloud Storage System Using Role Based Access Control

"A cloud storage system is collection of storage servers. A Secure cloud is a reliable source of information. Protection of the cloud is a very important task for cloud service providers. Today is the need of low-mainte...

Download PDF file
  • EP ID EP357606
  • DOI -
  • Views 86
  • Downloads 0

How To Cite

(2015). Securing TCP/IP Stacks Using IP Tables. International Journal of Science and Research (IJSR), 4(3), -. https://europub.co.uk/articles/-A-357606