Sign In
Not register? Register Now!
Essay Available:
Pages:
3 pages/≈825 words
Sources:
4 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Research Proposal
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 16.2
Topic:

Research and Describe TCP-IP Security and Cover Channels (Research Proposal Sample)

Instructions:

Dicuss tcp-ip security and covert channels Vulnerabilities

source..
Content:


TCP-IP Security and Covert Channels
Name
Institutional Affiliation
TCP-IP Security
The Transmission Control Protocol/Internet Protocol make up the Internet Protocol suite, which is made of common concepts and communication protocols used over the internet about computers linked on a network. The internet protocol suite turns out vital in the modern day of wireless communications based on the foundational set of instructions or protocols that define the steps and procedures of wireless communication between two or more computers in a linked network. The communication unit defines the packets of data, transmission routes, addresses and destinations of information sent over a network. The communication entity is organized into four necessary layers classified by the related functionality in a connection case. The link layer is the lowest of the four abstraction layers and contains instruction on specific data that remains within one network segment.
The internet layer is preceded by the link layer and fundamentally in cooperates protocols responsible for internetworking between independent networks (Shang, W. et al. 2016). The transport layer is the third layer from the lowest and contains instructions essential in a host to host communications between linked machines while the application layer is the highest layer of the four layers and handles merely the process of data allocation and exchanged between active applications. The internet protocol suite significantly contributes to the success of many internet communications. However, there are various vulnerabilities in the communication entity that often compromises many connected users over the internet. Address Resolution protocol spoofing turns out one of the weaknesses associated with the transmission control protocol and internet address.
The Address Resolution Protocol spoofing involves falsified messages send over a local area network which in turn results in a linking process of the attacker's Media Access Control with the Internet Protocol of a legitimate computer or an authenticated server in the local area network. Upon the false connect the malicious computer gets to accepts data and vita information intended for the mimicked internet address over the network. The ARP spoofing attack in many cases turns out fatal in cases of enterprise connections over the internet since vital information about classified operations falls into malicious machines and users. The vulnerability can enable malicious parties to intercept connection, stop in-transit data and even modify a link as well as connected users.
Despite the devastating possibilities of the Address Resolution Protocol spoofing; there are possible detection, prevention and protection measures designed to detect and prevent a user in a case of the attack (Herrera, R. et al. 207). Additionally, advanced protection measure ensures related situations of the Address Resolution Protocol spoofing keep at bay from users in a local area network. Avoiding trust relationships is one of the prevention measures, Packet filtering, however, significantly aid in detection and prevention operations in a network condition. The strategy involves filtering network packets sent from an IP address to ensure they match the address from which they

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

Need a Custom Essay Written?
First time 15% Discount!