ACN Research Paper

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

This paper discusses various security problems in TCP/IP Protocol.

1. Summary of TCP/IP:
a. TCP/IP Architecturer:
In TCP/IP architecture,we have 4 layers namely: Application,Transport,Network and Data
Link Layers. Application layer used for different application programs.Transport layer
provides end to end communication between the 2 hosts.Network layer responsible for ip
addressing.Data link layer provides physical ports of any transport media.There are various
well known ports like
FTP-21,TELNET-23,SNMP-25,DNS-53,DNS-53.
b. Working of TCP/IP:
b.1: Connection process of TCP: It is a reliable,connection oriented protocol.It
establishment is a three way handshake process.
Firstly,there is connection establishment: here host sends a random sequence number
which is request packet without sending any data.
Secondly, there is data transfer: Here host sends seq number as well as data.
Thirdly,we have connection termination: Here link between 2 hosts breaks.

c.TCP Segment format: At the level of Transport layer,every packet is called as segments
When data comes from layers above TL,we get a big chunk of data,which we break it
down into segments.
When you try to send data from source process to destination process,IP(Source) and
IP(destination) will help transport this data but I need a specific no. for the process which
is currently executing at the sender.
There are simple methodologies for this numbering which is given by IANA.

d. TCP Congestion Control:


1.Slow Start Phase: Here there is exponential growth in congestion window(wc)
Initialise wc as 1or 2.
2. Collision Avoidance Phase: Here there is Linear growth in wc.
3. Continuously Detect Collision:
Two ways are there
a. Timeout: Used when congestion is severe
Make Wth = wc/2 and go to slow start phase.
b. Three duplicate acknowledgement: used when congestion is mild
Make wth=wc/2 and go to congestion avoidance phase.

4. TCP/IP Protocol Security Problems and Defenses:


There are various flaws in the protocol causes system under attack.
A. Safety Issues :
A.1: An IP protocol do transmission of data free from connections and send data as
according to the destination address.
That is when IP routes an IP Packet,it does not check the source address in the IP
Packet header.
That’s way,many services that are depends on source address for confirmation will
cause problems.

A.2: To explain it,We explain as according to Firewall.


Few network firewalls authenticate IP Packets from reliable resources.
IP address doesn’t verify,if the IP Packet source in the ip packet is true address
of source host.

B. A. Defense of TCP protocol security issues:


B.1: Do changes in the routing of the network segment which include limiting the flow
and number of SYN half packets.
B.2: See the front end of the router. Only the data packets that complete the TCP three-
way handshake process can enter the network segment, so as to defend against such
attacks.

C. Defense of IP protocol security issues :

C.1 Use address base authentication strategy.

C.2 Adopt filter packets. If the network is connected through routing, then use the routing to
filter the packets. Confirm that only internal LAN is trusted. The server on the internal local
Lan should be cautious about any hosts outside the local Lan. Routing can filter all the
requests that wish to establish connections with the internal.

C.3 Use decoding. An easy way to defend against fake IP address is to request for
transmission and authentication with decoding. Decoding may be the most effective methods
among multiple approaches.

You might also like