4,559 Hits in 5.9 sec

Representing TCP/IP connectivity for topological analysis of network security

R. Ritchey, B. O'Berry, S. Noel
18th Annual Computer Security Applications Conference, 2002. Proceedings.  
This paper presents a modem of network connectivity at multiple levels of the TCP/IP stack appropriate for use in a model checker.  ...  Topological vulnerability analysis (TVA) extends this by searching for sequences of interdependent vulnerabilities, distributed among the various network hosts.  ...  Paul Ammann for his encouragement, Chuck Hutchinson for sharing his good ideas, and Dr. Sushil Jajodia and the GMU Center For Secure Information Systems for supporting the research.  ... 
doi:10.1109/csac.2002.1176275 dblp:conf/acsac/RitcheyON02 fatcat:ksntepngorg7bktv5bgpblcdwa

TCP/IP: The next generation

E. G. Britton, J. Tavs, R. Bournas
1995 IBM Systems Journal  
hosts in a TCP/IP network.  ...  As an advisory engineer in the TCP/IP Performance depart- ment, he works on performance design, analysis, and model- ing.  ... 
doi:10.1147/sj.343.0452 fatcat:p2d5xc2xpva33og7sjptb5dhb4

Security problems in the TCP/IP protocol suite

S. M. Bellovin
1989 Computer communication review  
The TCP/IP protocol suite, which is very widely used today, was developed under the sponsorship of the Department of Defense.  ...  Despite that, there are a number of serious security flaws inherent in the protocols, regardless of the correctness of any implementations.  ...  ACKNOWLEDGEMENTS Dave Presotto, Bob Gilligan, Gene Tsudik, and especially Deborah Estrin made a number of useful suggestions and corrections to a draft of this paper.  ... 
doi:10.1145/378444.378449 fatcat:76af2tpq2jar5oqg3jm2fmpa3y

Research on the System Structure of IPV9 Based on TCP/IP/M

Jianguo Wang, Zhongsheng Wang, Jianping Xie, Wei Zhong
2019 International Journal of Advanced Network, Monitoring, and Controls  
TCP/IP as the core network technology is successful, it has shortcomings but is a reasonable existence, will continue to play a role.  ...  of the network, realizes the long-distance and large-traffic data transmission of the future network, and lays a solid foundation for the digital currency and virtual currency of the Internet.  ...  ACKNOWLEDGMENT This paper is sponsored by the Xi'an Decimal Network Technology Co., Ltd..  ... 
doi:10.21307/ijanmc-2019-054 fatcat:wjdtagqnmzevxjoxp26jgcofze

Covert channels in TCP/IP protocol stack - extended version-

Aleksandra Mileva, Boris Panajotov
2014 Open Computer Science  
AbstractWe give a survey of different techniques for hiding data in several protocols from the TCP/IP protocol stack. Techniques are organized according to affected layer and protocol.  ...  For most of the covert channels its data bandwidth is given.  ...  Many network covert channels are identified and detected. This is a continuous race between hackers and security experts. Surveys of this type are necessary for following trends in this field.  ... 
doi:10.2478/s13537-014-0205-6 fatcat:tkkyehibpbf3tl5x5bctsqkk6y

Enhancement of Security in Wireless Sensor Network by Using Trust Evaluation and TCP/IP Based Technology

Rahul Das, Dr. Mona Dwivedi
2022 International Journal of Innovative Research in Computer Science & Technology  
The advent of wireless sensor network has given birth to new kinds of routing algorithms and new security threats.  ...  Wireless LANs transmit and receive data without physical channel means over the air so no need for a wired connection. For this radio frequency (RF) technology is used.  ...  Enhancement of Security in Wireless Sensor Network by Using Trust Evaluation and TCP/IP Based Technology Rahul Das 1 , and Dr. Mona Dwivedi 2 I.  ... 
doi:10.55524/ijircst.2022.10.1.13 fatcat:zwe6nkxlfbabnpjjzbz7hdob2e

Improving TCP/IP Performance over Third-Generation Wireless Networks

Mun Choon Chan, R. Ramjee
2008 IEEE Transactions on Mobile Computing  
Second, we present a wireless channel and TCP-aware scheduling and buffer sharing algorithm that reduces the latency of short flows while still exploiting user diversity for a wide range of user and traffic  ...  First, one of the biggest challenges in optimizing the TCP performance over the 3G wireless networks is adapting to the significant delay and rate variations over the wireless channel.  ...  Since the vast majority of data applications use the TCP/IP protocols, optimizing the TCP performance over these networks would have a broad and significant impact on the user-perceived data application  ... 
doi:10.1109/tmc.2007.70737 fatcat:zeqqzl4qkndfvdno6jpxar6nsq

Implementation of an Optimized Steganography Technique over TCP/IP and Tests Against Well-Known Security Equipment

M. Tarhda, R. E. Gouri, L. Hlou
2018 Engineering, Technology & Applied Science Research  
In the current work, we propose to implement an optimized steganography technique over TCP/IP protocol [1]. We have also tested it against well-known security equipment using latest versions.  ...  Facing this situation, network security has become very important and challenges related to the protection of exchanged data over the internet against unauthorized access and use have increased.  ...  Network topology for test purpose B. Fortigate Firewall 1) Presentation Fortinet is a leading network security editor [3] .  ... 
doi:10.48084/etasr.2334 fatcat:r4umpvh6vfhjtnu3onoxjqybda

An approach towards anomaly based detection and profiling covert TCP/IP channels

Patrick A. Gilbert, Prabir Bhattacharya
2009 2009 7th International Conference on Information, Communications and Signal Processing (ICICS)  
This model characterizes the topology of TCP/IP security to enable a better understanding of the related vulnerabilities.  ...  A model of TCP/IP networks in regard to some well-known security threats is presented in [24] .  ... 
doi:10.1109/icics.2009.5397551 fatcat:z6mkmgm6ffdpdeqsn4x33pwoju

A multi-agent monitoring and diagnostic system for TCP/IP-based network and its coordination

Toshiharu Sugawara, Ken-ichiro Murakami, Shigeki Goto
2001 Knowledge-Based Systems  
This paper describes an application of an AI-based multiagent system to the management and diagnosis of TCP/IP-based intranet/intra-AS (autonomous system) computer networks.  ...  An example of cooperative diagnosis clari®es why this multiagent approach is essential for network management. q  ...  Acknowledgements I would like to thank Professor Katsuharu Tsukamoto, Kogakuin University, Tokyo, and Professor Rikio Onai, The University of Electro-Communications, Tokyo, for providing support for this  ... 
doi:10.1016/s0950-7051(01)00150-2 fatcat:ld3cf7vcejgnrguejcbvwvifo4

QoS Support in ARINC 664 P8 Data Networks: ATN Applications Over TCP/IP Ground-to-Ground Subnetworks

Haowei Bai, Mohammed Atiquzzaman, William Ivancic
2006 Journal of Aerospace Computing Information and Communication  
ARINC 664 Part 8 committee has been developing an approach for inter-operation of ATN applications over the commercial TCP/IP networks.  ...  The current ICAO ATN model specifies a standalone network with its own protocols, which requires building an expensive separate network for air-ground and ground-ground communications.  ...  The work described above [5] [6] [7] [8] which recommend the use of TCP/IP protocol suite for implementing ATN are based on architectural and/or cost analysis.  ... 
doi:10.2514/1.18661 fatcat:wsj7aqmrtbb4tjqpyqymzuttrq

Comparison overview of an active fingerprinting application of the second and the third layer of TCP/IP stack

Volodymyr Mosorov, Sebastian Biedron, Taras Panskyi
2015 Eastern-European Journal of Enterprise Technologies  
фингерпринтинг, уровень передачи данных, стек уровня TCP/IP UDK 004.738.5.057.4  ...  , рівень передачі даних, стек рівня TCP/IP Фингерпринтинг, как правило, используется во избежание сравнения и передачи громоздких данных.  ...  With the appropriate knowledge and tools, as the administrator we can check the security of our systems or, if we have not done this before, learn the topology and operation of the network we manage.  ... 
doi:10.15587/1729-4061.2015.50983 fatcat:o7uwmy6d5rg6tgmlkm27miz2im

Using an Event Data Taxonomy to Represent the Impact of Cyber Events as Geometrical Instances

Gustavo Gonzalez-Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro
2018 IEEE Access  
Abstract-Visualization and simulation models used for the evaluation and selection of security countermeasures need accurate data to compute the impact of cyber events (e.g., malicious and benign actions  ...  Using an event data taxonomy to represent the impact of cyber events as geometrical instances. IEEE access, 2018, 6, pp.  ...  Channels can also regroup IP addresses, port numbers, protocols and all other kind of TCP/IP connections. More information about these data-types are found in the research of Gonzalez-Granadillo et al  ... 
doi:10.1109/access.2017.2740402 fatcat:zij3s5nxufg4jhuinp2fcd7xte

A High Performance Communication Architecture for a Smart Micro-Grid Testbed Using Customized Edge Intelligent Devices (EIDs) with SPI and Modbus TCP/IP Communication Protocols

Yunpeng Si, Nikhil Korada, Raja Ayyanar, Qin Lei
2021 IEEE Open Journal of Power Electronics  
Protocols such as Modbus TCP/IP and Distributed Network Protocol 3 (DNP3) are widely used in commercial DER inverters to facilitate communication with supervisory devices [6] .  ...  This paper provides a convenient and comprehensive solution to SPI and Modbus TCP/IP communication implementation in a smart micro-grid.  ...  ACKNOWLEDGMENT The authors would like to thank Poundra, LLC for their great support for the hardware design and the technical documents of the EID prototypes in Section III.  ... 
doi:10.1109/ojpel.2021.3051327 fatcat:7navjaflkfcijd3ney3zvtlf3e

Modelling computer networks for further security research

Zsolt Bederna, Tamás Szádeczky
2021 Security and Defence Quarterly  
We aim to develop a model which leverages all aspects of a networked computer and, therefore, provides complete information to the scientist for all further security research, especially that related to  ...  Each layer of the ISO/OSI model has its topology separately, but all of them also work as part of the complex system to operate the network.  ...  In the following subchapters, we review the rules which affect network topology for TCP/IP layers.  ... 
doi:10.35467/sdq/141572 fatcat:kbeybaruf5as5g5myktvsrhple
« Previous Showing results 1 — 15 out of 4,559 results