Introduction to TCP / IP Network Attacks

Computation model has experienced a significant change since the emergence of the computer networks, which brought us much benefit that is difficult or even impossible to achieve by the traditional centralized system, such as resource sharing, high reliability, better price/performance ratio, and so on. Meanwhile, there also come many potential threats to the network community like unauthorized access to private information, malicious break-in to other organizations’ systems, or intent to render a system to make it unreliable or unusable. Network attacks generally adopt computer networks as transportation media to convey the intrusion or even attack the communication system itself. We will put our focus mainly on the network attacks happened around the TCP/IP (Transmission Control Protocol/Internet Protocol) protocol suite, which is the most widely used communication protocol and the de facto standard among the Internet society. KEYWORD: Network Attack, TCP/IP.

[1]  I. Damgård,et al.  The protocols. , 1989, The New Zealand nursing journal. Kai tiaki.

[2]  Rita C. Summers Secure Computing: Threats and Safeguards , 1996 .

[3]  S. M. Bellovin,et al.  Security problems in the TCP/IP protocol suite , 1989, CCRV.

[4]  Markus G. Kuhn,et al.  Analysis of a denial of service attack on TCP , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[5]  Roger M. Needham,et al.  Denial of service , 1993, CCS '93.