Hongach Jr, 2018 - Google Patents
Mitigating security flaws in the tcp/ip protocol suiteHongach Jr, 2018
- Document ID
- 2145640367831335164
- Author
- Hongach Jr W
- Publication year
External Links
Snippet
The TCP/IP protocol suite is vulnerable to a variety of well-known attacks that have been confirmed and published over the past twenty-five years. These vulnerabilities affect nearly all network traffic, including Internet communication, due to the widespread acceptance of …
- 235000010384 tocopherol 0 title abstract description 185
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20170374030A1 (en) | System and method for redirected firewall discovery in a network environment | |
| US20070033645A1 (en) | DNS based enforcement for confinement and detection of network malicious activities | |
| Noonan et al. | Firewall fundamentals | |
| Mohammed et al. | Honeypots and Routers: Collecting internet attacks | |
| Patel et al. | Security issues, attacks and countermeasures in layered IoT ecosystem | |
| Janbeglou et al. | Redirecting network traffic toward a fake DNS server on a LAN | |
| Ahmad et al. | Analysis of network security threats and vulnerabilities by development & implementation of a security network monitoring solution | |
| Hongach Jr | Mitigating security flaws in the tcp/ip protocol suite | |
| Janbeglou et al. | Redirecting outgoing DNS requests toward a fake DNS server in a LAN | |
| Kaeo | Operational Security Current Practices in Internet Service Provider Environments | |
| Batchvarov | Security Issues and Solutions for Voice over IP Compared to Circuit Switched Networks | |
| Karamagi | Comptia Security+ Practice Exams | |
| van Oorschot | Firewalls and tunnels | |
| Verwoerd et al. | Security architecture testing using IDS—a case study | |
| Mölsä | Mitigating denial of service attacks in computer networks | |
| Aledhari et al. | Protecting Internet Traffic: Security Challenges and Solutions | |
| Shoniregun | Synchronizing internet protocol security (sipsec) | |
| Μπαξεβάνος | Protecting with network security strategies a medium size enterprise and implementing scenarios attacks and countermeasures on cisco equipment | |
| Basin et al. | Information security | |
| Sulaman | An Analysis and Comparison of The Security Features of Firewalls and IDSs | |
| Sarjiyus et al. | Simulation of an Enhanced Network Security Framework for Federal Polytechnic Mubi | |
| Gurusamy | DIPLOMA THESIS ASSIGNMENT | |
| Goh | Intrusion detection framework for encrypted networks | |
| Williamson | The good, the bad, and the actively verified | |
| Khan et al. | A survey on network attacks and defence-in-depth mechanism by intrusion detection system |