• Login
  • Help Guide
View Item 
  •   JOOUST IR Home
  • Journal Articles
  • School of Informatics & Innovative Systems
  • View Item
  •   JOOUST IR Home
  • Journal Articles
  • School of Informatics & Innovative Systems
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

TCP IP header attack vectors and countermeasures

Thumbnail
View/Open
Main article (964.1Kb)
Publication Date
2017-02
Author
Nyangaresi, Vincent O.
Ogara, Solomon O.
Abeka, Silvance O.
Type
Article
Metadata
Show full item record
Abstract/Overview

The TCP IP header has security vulnerabilities that make it prone to numerous kinds of attacks such as TCP SYN flooding, TCP RST, source quench, TCP session hijacking, TCP sequence number prediction, port scanning, CHARGEN and ECHO. The purpose of this paper was to investigate the attack vectors for various TCP IP header attacks and suggest possible countermeasures to curb these attacks. The goals were to gain an understanding on what makes the TCP IP header architecture vulnerable, so that appropriate countermeasures to address these shortcomings could be instigated; based on their performance in terms of their efficiency in curbing the various attack vectors exploiting these vulnerabilities. To achieve this, a combined experimental - simulation approach was employed using Wireshark network analyzer, Nmap, Ettercap, Aireplay-ng and Airodump-ng from Aircrack-ng suite software. A sample network utilizing the transmission control protocol was designed and some packets transmitted over it. The packet traffic volume, sequence numbers, acknowledgement numbers, associated protocols, TCP handshake and packets in flight were then studied. The results obtained indicate that the TCP IP header is indeed susceptible, most probably because the initial intent of the TCP was to share information and security was not a major concern at that time. However, as the internet is now open to the general public and not restricted to the department of defense where it was initially meant to serve, there is need to develop novel algorithms that could help mitigate the weaknesses inherent in the TCP architecture. This study is of help to network designers and administrators as it aids them to identify how to structure their networks for in-depth security by adding another layer of security at the TCP IP header level to support the network-based controls such as next generation firewalls.

Subject/Keywords
TCP IP Header; Attack Vector; Vulnerabilities; Countermeasures
Publisher
Science publishing group
Permalink
http://www.sciencepublishinggroup.com/j/ajset
http://62.24.102.115:8080/xmlui/handle/123456789/1246
Collections
  • School of Informatics & Innovative Systems [119]

Browse

All of JOOUST IRCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

LoginRegister

Statistics

View Usage Statistics

Contact Us

Copyright © 2023-4 Jaramogi Oginga Odinga University of Science and Technology (JOOUST)
P.O. Box 210 - 40601
Bondo – Kenya

Useful Links

  • Report a problem with the content
  • Accessibility Policy
  • Deaccession/Takedown Policy

TwitterFacebookYouTubeInstagram

  • University Policies
  • Access to Information
  • JOOUST Quality Statement