please answer this security question

Computer Science
Tutor: None Selected Time limit: 1 Day

Pick one of the protocols discussed in Chapter 7, e.g. TCP, or SMTP, or TELNET. Search for information on a vulnerability impacting that protocol.  Cite the source and describe the vulnerability and mitigation for your classmates.

Nov 4th, 2014

TCP

An attacker can send TCP packets to Windows, in order to trigger a denial of service. By manipulating the state of a TCP connection, an attacker could force the TCP connection to remain in a long-lived state, possibly indefinitely. If enough TCP connections are forced into a long-lived or indefinite state, resources on a system under attack may be consumed, preventing new TCP connections from being accepted (Radhakrishnan, Cheng, Chu, Jain, & Raghavan, 2011).

The mitigation steps include the implementation of an IP security that will be in a psostion to encrypt traffic at the network layer. secondly should be the reduction of the TCP window size and finally failing to publish TCP source port information (Radhakrishnan, Cheng, Chu, Jain, & Raghavan, 2011).

References

Radhakrishnan, S., Cheng, Y., Chu, J., Jain, A., & Raghavan, B. (2011, December). TCP fast open. In Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies (p. 21). ACM.


Nov 4th, 2014

Did you know? You can earn $20 for every friend you invite to Studypool!
Click here to
Refer a Friend
...
Nov 4th, 2014
...
Nov 4th, 2014
Dec 7th, 2016
check_circle
Mark as Final Answer
check_circle
Unmark as Final Answer
check_circle
Final Answer

Secure Information

Content will be erased after question is completed.

check_circle
Final Answer