World trade and related business ventures are more or less dependent on communication. Information content of communication is to be protected as miscommunication or incorrect information may ruin any business prospect. Communication using Internet or any other electronic communication is having various kinds of threat and vulnerability. Information should be packaged for communication in such a way that these vulnerabilities are reduced to a minimum. This paper focuses on the most common attacks to paralyze computer and network resources, in order to stop essential communication services. The paper provides methods, ways and means for obtaining network traces of malicious traffic and strategies for providing countermeasures. Analysis of packet captured in a network traffic is a common method of deletion of countermeasure of communication based vulnerabilities. Analysis of http based network traffic allows to intercept sensitive information such as the user's name and password. The ideal approach for secured communication is to remove all security flaws from individual hosts. A tradeoff between overheads (computational and business) and efficiency of securing mechanism of communication may be achieved by using the script based solutions. This paper presents the communication based vulnerabilities and their script based solution.
[1]
Chris Sanders.
Practical packet analysis
,
2007
.
[2]
Joe Habraken.
Absolute Beginner's Guide to Networking, Fourth Edition
,
2003
.
[3]
Chris Sanders,et al.
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
,
2007
.
[4]
Douglas Comer,et al.
Internetworking with TCP/IP
,
1988
.
[5]
Usha Banerjee,et al.
Evaluation of the Capabilities of WireShark as a tool for Intrusion Detection
,
2010
.
[6]
David Slee.
Common Denial of Service Attacks
,
2007
.
[7]
Angela Orebaugh,et al.
Wireshark & Ethereal Network Protocol Analyzer Toolkit
,
2007
.
[8]
Hussein Al-Bahadili,et al.
Network Security Using Hybrid Port Knocking
,
2010
.
[9]
Douglas E. Comer,et al.
Internetworking with TCP/IP - Principles, Protocols, and Architectures, Fourth Edition
,
1988
.