3 pages/≈825 words
IT & Computer Science
Research and Describe TCP-IP Security and Cover Channels (Research Proposal Sample)
Dicuss tcp-ip security and covert channels Vulnerabilitiessource..
TCP-IP Security and Covert Channels
The Transmission Control Protocol/Internet Protocol make up the Internet Protocol suite, which is made of common concepts and communication protocols used over the internet about computers linked on a network. The internet protocol suite turns out vital in the modern day of wireless communications based on the foundational set of instructions or protocols that define the steps and procedures of wireless communication between two or more computers in a linked network. The communication unit defines the packets of data, transmission routes, addresses and destinations of information sent over a network. The communication entity is organized into four necessary layers classified by the related functionality in a connection case. The link layer is the lowest of the four abstraction layers and contains instruction on specific data that remains within one network segment.
The internet layer is preceded by the link layer and fundamentally in cooperates protocols responsible for internetworking between independent networks (Shang, W. et al. 2016). The transport layer is the third layer from the lowest and contains instructions essential in a host to host communications between linked machines while the application layer is the highest layer of the four layers and handles merely the process of data allocation and exchanged between active applications. The internet protocol suite significantly contributes to the success of many internet communications. However, there are various vulnerabilities in the communication entity that often compromises many connected users over the internet. Address Resolution protocol spoofing turns out one of the weaknesses associated with the transmission control protocol and internet address.
The Address Resolution Protocol spoofing involves falsified messages send over a local area network which in turn results in a linking process of the attacker’s Media Access Control with the Internet Protocol of a legitimate computer or an authenticated server in the local area network. Upon the false connect the malicious computer gets to accepts data and vita information intended for the mimicked internet address over the network. The ARP spoofing attack in many cases turns out fatal in cases of enterprise connections over the internet since vital information about classified operations falls into malicious machines and users. The vulnerability can enable malicious parties to intercept connection, stop in-transit data and even modify a link as well as connected users.
Despite the devastating possibilities of the Address Resolution Protocol spoofing; there are possible detection, prevention and protection measures designed to detect and prevent a user in a case of the attack (Herrera, R. et al. 207). Additionally, advanced protection measure ensures related situations of the Address Resolution Protocol spoofing keep at bay from users in a local area network. Avoiding trust relationships is one of the prevention measures, Packet filtering, however, significantly aid in detection and prevention operations in a network condition. The strategy involves filtering network packets sent from an IP address to ensure they match the address from which they came. The Use of ARP spoofing software, as well as cryptographic network protocols, further detect and prevent as well as protect against attacks from maliciously changed internet addresses in a local area network.
The integrity and consistency of user data have been a vital factor in many computer security strategies put up to ensure the security of user data and information from potential threats. However, some threats still pose problems in relation user data in many cases. Covert channel refers to an exceptional case of security attack that creates a possibility for the transfer of data and information between two processes that are not supposed to interact or communicate in a system governed by computer security policies. Basically, in 1973 the term was coined by Lampson about unintended service programs effects on systems loads. A covert channel in many cases stays hidden from the access control methods or mechanisms of a secure operating system based on the fact that covert channels do not use authentic access protocols recognized by the underlying operating system and hence remains undetected and uncontrolled by an operating system.
There are two primary types of covert channel related attacks in typical system operation; Covert Storage channel and covert Timing Channel. Covert storage channels associate significantly to systems memory operations and therefore refers to an occurrence where system out-of-band information or data gets stored in massages for memory clearance and reuse by the underlying operating system (Maurice, C. et al. 2015). The covert storage channel attack, therefore, occurs when the messages or packets gets sent over a network with the messages still contained within, which occasionally tip off potential attackers of the processes that created the message. Similarly, certain data types of messages like the ICM...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
- Research Paper On Designing A Data Network For Acme, Inc. Description: A computer network describes a digital telecommunication network that allows various nodes to share resources (Gupta, 2006)...6 pages/≈1650 words| 3 Sources | APA | IT & Computer Science | Research Proposal |
- Computer Science Research on Windows Network Description: How will the shares be secured? Will quotas be used? FSRM be configured? What technology will be implemented to provide secure remote access for users?...2 pages/≈550 words| 3 Sources | APA | IT & Computer Science | Research Proposal |
- Bar Code Technology in Healthcare: The Opportunities and Implementation IssuesDescription: Proposed study is relevant in the healthcare sector, especially considering that there are multiple issues in healthcare that may be managed using technology...9 pages/≈2475 words| 4 Sources | APA | IT & Computer Science | Research Proposal |