Security

Submitted by: Submitted by

Views: 254

Words: 7281

Pages: 30

Category: Science and Technology

Date Submitted: 10/18/2012 03:38 AM

Report This Essay

Introduction to TCP/IP Network Attacks

Guang Yang

sunlight@cs.iastate.edu

Department of Computer Science

Iowa State University

Ames, IA 50011

ABSTRACT

Computation model has experienced a significant change since the emergence of the

computer networks, which brought us much benefit that is difficult or even impossible to

achieve by the traditional centralized system, such as resource sharing, high reliability,

better price/performance ratio, and so on. Meanwhile, there also come many potential

threats to the network community like unauthorized access to private information,

malicious break-in to other organizations’ systems, or intent to render a system to make

it unreliable or unusable. Network attacks generally adopt computer networks as

transportation media to convey the intrusion or even attack the communication system

itself. We will put our focus mainly on the network attacks happened around the TCP/IP

(Transmission Control Protocol/Internet Protocol) protocol suite, which is the most

widely used communication protocol and the de facto standard among the Internet

society.

KEYWORD: Network Attack, TCP/IP.

2

TABLE OF CONTENTS

1. TCP/IP BASICS ............................................................................................................3

1.1 PROTOCOL HIERARCHY.............................................................................................3

1.2 IP ...............................................................................................................................3

1.3 UDP ..........................................................................................................................4

1.4 TCP...........................................................................................................................5

2. ESSENTIAL HACKING TECHNIQUES ..................................................................6

2.1 IP ADDRESS SPOOFING...