Pick one of the protocols discussed in Chapter 7, e.g. TCP, or
SMTP, or TELNET. Search for information on a vulnerability impacting that
protocol. Cite the source and describe the vulnerability and mitigation
for your classmates.
An attacker can send TCP packets to Windows, in order to trigger a denial of service. By manipulating the state of a TCP connection, an attacker
could force the TCP connection to remain in a long-lived state, possibly
indefinitely. If enough TCP connections are forced into a long-lived or
indefinite state, resources on a system under attack may be consumed,
preventing new TCP connections from being accepted (Radhakrishnan, Cheng, Chu, Jain, & Raghavan, 2011).
The mitigation steps include the implementation of an IP security that will be in a psostion to encrypt traffic at the network layer. secondly should be the reduction of the TCP window size and finally failing to publish TCP source port information (Radhakrishnan, Cheng, Chu, Jain, & Raghavan, 2011).
Radhakrishnan, S., Cheng, Y., Chu, J., Jain, A., & Raghavan, B. (2011, December). TCP fast open. In Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies (p. 21). ACM.
Nov 4th, 2014
Did you know? You can earn $20 for every friend you invite to Studypool!