Research and Describe TCP-IP Security and Cover Channels (Research Proposal Sample)
Dicuss tcp-ip security and covert channels Vulnerabilitiessource..
TCP-IP Security and Covert Channels
The Transmission Control Protocol/Internet Protocol make up the Internet Protocol suite, which is made of common concepts and communication protocols used over the internet about computers linked on a network. The internet protocol suite turns out vital in the modern day of wireless communications based on the foundational set of instructions or protocols that define the steps and procedures of wireless communication between two or more computers in a linked network. The communication unit defines the packets of data, transmission routes, addresses and destinations of information sent over a network. The communication entity is organized into four necessary layers classified by the related functionality in a connection case. The link layer is the lowest of the four abstraction layers and contains instruction on specific data that remains within one network segment.
The internet layer is preceded by the link layer and fundamentally in cooperates protocols responsible for internetworking between independent networks (Shang, W. et al. 2016). The transport layer is the third layer from the lowest and contains instructions essential in a host to host communications between linked machines while the application layer is the highest layer of the four layers and handles merely the process of data allocation and exchanged between active applications. The internet protocol suite significantly contributes to the success of many internet communications. However, there are various vulnerabilities in the communication entity that often compromises many connected users over the internet. Address Resolution protocol spoofing turns out one of the weaknesses associated with the transmission control protocol and internet address.
The Address Resolution Protocol spoofing involves falsified messages send over a local area network which in turn results in a linking process of the attacker's Media Access Control with the Internet Protocol of a legitimate computer or an authenticated server in the local area network. Upon the false connect the malicious computer gets to accepts data and vita information intended for the mimicked internet address over the network. The ARP spoofing attack in many cases turns out fatal in cases of enterprise connections over the internet since vital information about classified operations falls into malicious machines and users. The vulnerability can enable malicious parties to intercept connection, stop in-transit data and even modify a link as well as connected users.
Despite the devastating possibilities of the Address Resolution Protocol spoofing; there are possible detection, prevention and protection measures designed to detect and prevent a user in a case of the attack (Herrera, R. et al. 207). Additionally, advanced protection measure ensures related situations of the Address Resolution Protocol spoofing keep at bay from users in a local area network. Avoiding trust relationships is one of the prevention measures, Packet filtering, however, significantly aid in detection and prevention operations in a network condition. The strategy involves filtering network packets sent from an IP address to ensure they match the address from which they
- Research and Describe TCP-IP Security and Cover Channels Description: The communication entity is organized into four necessary layers classified by the related functionality in a connection case. ...3 pages/≈825 words| 4 Sources | APA | IT & Computer Science | Research Proposal |
- Research Paper On Designing A Data Network For Acme, Inc. Description: A computer network describes a digital telecommunication network that allows various nodes to share resources (Gupta, 2006)...6 pages/≈1650 words| 3 Sources | APA | IT & Computer Science | Research Proposal |
- Bar Code Technology in Healthcare: The Opportunities and Implementation IssuesDescription: Proposed study is relevant in the healthcare sector, especially considering that there are multiple issues in healthcare that may be managed using technology...9 pages/≈2475 words| 4 Sources | APA | IT & Computer Science | Research Proposal |