Chapter 75: Transmission Control Protocol/Internet Protocol Packet Analysis

Pramod Pandya     California State University Fullerton, Fullerton, CA, United States

Abstract

To manage network security, you need an in-depth understanding of the Transmission Control Protocol/Internet Protocol (TCP/IP) stack. This chapter will discuss how TCP/IP packets are constructed and analyzed, to interpret applications that use the TCP/IP stack. The intrusion detection principle relies on being able to analyze the packets and detect a potential attack or an attack in progress. We will introduce the Internet model to develop the argument to support packet data networking for local and wide area networks that include the Internet.

Keywords

Data link layer; Data rate; ...

Get Computer and Information Security Handbook, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.