[go: up one dir, main page]

Hongach Jr, 2018 - Google Patents

Mitigating security flaws in the tcp/ip protocol suite

Hongach Jr, 2018

Document ID
2145640367831335164
Author
Hongach Jr W
Publication year

External Links

Snippet

The TCP/IP protocol suite is vulnerable to a variety of well-known attacks that have been confirmed and published over the past twenty-five years. These vulnerabilities affect nearly all network traffic, including Internet communication, due to the widespread acceptance of …
Continue reading at search.proquest.com (other versions)

Similar Documents

Publication Publication Date Title
US20170374030A1 (en) System and method for redirected firewall discovery in a network environment
US20070033645A1 (en) DNS based enforcement for confinement and detection of network malicious activities
Noonan et al. Firewall fundamentals
Mohammed et al. Honeypots and Routers: Collecting internet attacks
Patel et al. Security issues, attacks and countermeasures in layered IoT ecosystem
Janbeglou et al. Redirecting network traffic toward a fake DNS server on a LAN
Ahmad et al. Analysis of network security threats and vulnerabilities by development & implementation of a security network monitoring solution
Hongach Jr Mitigating security flaws in the tcp/ip protocol suite
Janbeglou et al. Redirecting outgoing DNS requests toward a fake DNS server in a LAN
Kaeo Operational Security Current Practices in Internet Service Provider Environments
Batchvarov Security Issues and Solutions for Voice over IP Compared to Circuit Switched Networks
Karamagi Comptia Security+ Practice Exams
van Oorschot Firewalls and tunnels
Verwoerd et al. Security architecture testing using IDS—a case study
Mölsä Mitigating denial of service attacks in computer networks
Aledhari et al. Protecting Internet Traffic: Security Challenges and Solutions
Shoniregun Synchronizing internet protocol security (sipsec)
Μπαξεβάνος Protecting with network security strategies a medium size enterprise and implementing scenarios attacks and countermeasures on cisco equipment
Basin et al. Information security
Sulaman An Analysis and Comparison of The Security Features of Firewalls and IDSs
Sarjiyus et al. Simulation of an Enhanced Network Security Framework for Federal Polytechnic Mubi
Gurusamy DIPLOMA THESIS ASSIGNMENT
Goh Intrusion detection framework for encrypted networks
Williamson The good, the bad, and the actively verified
Khan et al. A survey on network attacks and defence-in-depth mechanism by intrusion detection system