Transmission Control Protocol/Internet Protocol Packet Analysis
Abstract
To manage network security, you need an in-depth understanding of the Transmission Control Protocol/Internet Protocol (TCP/IP) stack. This chapter will discuss how TCP/IP packets are constructed and analyzed, to interpret applications that use the TCP/IP stack. The intrusion detection principle relies on being able to analyze the packets and detect a potential attack or an attack in progress. We will introduce the Internet model to develop the argument to support packet data networking for local and wide area networks that include the Internet.
Keywords
Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.