1999
DOI: 10.1145/505754.505760
|View full text |Cite
|
Sign up to set email alerts
|

Internet vulnerabilities related to TCP/IP and T/TCP

Abstract: The Internet put the rest of the world at the reach of our computers. In the same way it also made our computers reachable by the rest of the world. Good news and bad news! Over the last decade, the Internet has been subject to widespread security attacks. Besides the classical terms, new ones had to be found in order to designate a large collection of threats: Worms, break-ins, hackers, crackers, hijacking, phrackers, spoofing, man-in-the-middle, password-sniffing, denial-of-service , … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
11
0

Year Published

2000
2000
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 2 publications
0
11
0
Order By: Relevance
“…Marco de Vivo et al study the security vulnerabilities related to TCP/IP and T/IP protocol in detail [11], including IP spoofing, TCP hijacking, Packet sniffer and SYN flood etc. Besides the description of each intrusion, the way how they are carried out and, when possible, the related means of prevention, detection and/or defense are also discussed.…”
Section: Vulnerabilities and Intrusionsmentioning
confidence: 99%
“…Marco de Vivo et al study the security vulnerabilities related to TCP/IP and T/IP protocol in detail [11], including IP spoofing, TCP hijacking, Packet sniffer and SYN flood etc. Besides the description of each intrusion, the way how they are carried out and, when possible, the related means of prevention, detection and/or defense are also discussed.…”
Section: Vulnerabilities and Intrusionsmentioning
confidence: 99%
“…This is specially beneficial for short-lived, transactional (request/ response-style) TCP sessions that typically result from browsing the Web from a smart phone. However, existing solutions such as T/TCP RFC 1644 [27], have not been adopted due to known security concerns [38].…”
Section: Disabling Rfc 1144 Tcp/ip Header Compression (Wireless Host)mentioning
confidence: 99%
“…While T/TCP is safe to implement in shared networks from a congestion control perspective, several security implications of sending data in the first data segment have been identified [ddKI99].…”
Section: Implementation Issuesmentioning
confidence: 99%