Skip to Main Content
Advanced Internet Protocols, Services, and Applications
book

Advanced Internet Protocols, Services, and Applications

by Eiji Oki, Roberto Rojas-Cessa, Mallikarjun Tatipamula, Christian Vogt
April 2012
Intermediate to advanced content levelIntermediate to advanced
260 pages
7h 42m
English
Wiley
Content preview from Advanced Internet Protocols, Services, and Applications

13

IP NETWORK SECURITY

The security of networks can be assessed by reviewing the vulnerability of the deployed protocols to exploits. Threats exploit these vulnerabilities, misusing the networks to obtain some benefit or disrupt the service. This chapter discusses some popular threats and how they exploit protocol vulnerabilities. Some counter measures based on algorithms that either work as an application or as a protocol at the network or transport layers are discussed.

13.1 INTRODUCTION

A denial-of-service (DoS) attack or distributed denial-of-service (DDoS) attack is an attempt to exhaust the resources of a computer or network to prevent the victim from doing useful work. DoS attacks may involve gaining unauthorized access to network or computing resources [1]. DoS attacks have been mostly considered on servers, where the service provided to the intended users becomes noticeably diminished or unavailable. The victim can be a network server, a client or router, a network link or an entire network, an individual Internet user or a company doing business using the Internet, an Internet service provider (ISP), country, or any combination of or variant on these. One common form of attack involves saturating the target (victim) machine with external communications requests, such that it becomes unable to keep up with responding to legitimate requests, or it responds slow enough to be rendered unavailable. In general terms, DoS attacks are implemented by either forcing the targeted ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Internet of Things Security - Second Edition

Practical Internet of Things Security - Second Edition

Brian Russell, Drew Van Duren
Network Routing, 2nd Edition

Network Routing, 2nd Edition

Deep Medhi, Karthik Ramasamy

Publisher Resources

ISBN: 9780470499030Purchase book