Transmission Control Protocol Off Path Exploits in Web

2020 ◽  
Vol 17 (9) ◽  
pp. 3995-3998
Author(s):  
K. Kavyashree ◽  
C. N. Sowmyarani ◽  
P. Dayananda

The network community in the current scenario has faced lot of potential threats like restricted access to unauthorized network; break in through other organizations, making the system unavailable and so on. An off-path attacker can perform various attacks like Browser page read, Web phishing, website Spoofing and defacement to know the 4 tuples in Transmission Control Protocol. The attacker can also carry out Cross Site Scripting to know the sensitive information on websites. Cross Site Request Forgery which performs defective exploit on web. This helps in detecting the four tuples Sequence number, Acknowledgement number, Global IPID Counter and ports.

Author(s):  
Sukant Kishoro Bisoy ◽  
Prasant Kumar Pattnaik

The Transmission Control Protocol (TCP) is a reliable protocol of transport layer which delivers data over unreliable networks. It was designed in the context of wired networks. Due to popularity of wireless communication it is made to extend TCP protocol to wireless environments where wired and wireless network can work smoothly. Although TCP work in wireless and wired-cum-wireless network, the performance is not up to the mark. In literature lot of protocols has been proposed to adopt TCP in wireless mobile ad hoc network. In this, we present an overall view on this issue and detailed discussion of the major factors involved. In addition, we survey the main proposals which aim at adapting TCP to mobile and static Ad hoc environments. Specifically, we show how TCP can be affected by mobility and its interaction with routing protocol in static and dynamic wireless ad hoc network.


Author(s):  
Md. Shohidul Islam ◽  
Md. Niaz Morshed ◽  
Sk. Shariful Islam ◽  
Md. Mejbahul Azam

Congestion is an un-avoiding issue of networking, and many attempts and mechanisms have been devised to avoid and control congestion in diverse ways. Random Early Discard (RED) is one of such type of algorithm that applies the techniques of Active Queue Management (AQM) to prevent and control congestion and to provide a range of Internet performance facilities. In this chapter, performance of RED algorithm has been measured from different point of views. RED works with Transmission Control Protocol (TCP), and since TCP has several variants, the authors investigated which versions of TCP behave well with RED in terms of few network parameters. Also, performance of RED has been compared with its counterpart Drop Tail algorithm. These statistics are immensely necessary to select the best protocol for Internet performance optimization.


Sign in / Sign up

Export Citation Format

Share Document