StudentShare solutions
Triangle menu

Internet Security. The inherent weaknesses of the TCP/IP protocols - Essay Example

Nobody downloaded yet

Extract of sample
Internet Security. The inherent weaknesses of the TCP/IP protocols

The most common method involves flooding the victim machine with external communications requests, so much so that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable (Jelena Mirkovic et al. (2005) p38).
The other method is of obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately. Even though the technical laws of different countries vary, still denial-of-service attacks are considered as a crime in most of the countries. (Pastore & Dulaney (2004) p.33)
The TCP/IP protocols form the basis of today's Internet, but these protocols lack even the basic mechanisms for security, such as validation or encryption. Newer versions of these protocols such as IPV6 do have better security features but currently TCP/IP protocols are the ones most widely used and common protocols and so their lack of built-in security has become increasingly challenging. (Jelena Mirkovic et al. (2005) p.45).
Now in accordance with the question let us look at the working of the protocol to understand the loophole and the problem. In TCP/IP the TCP half uses sequence numbers to keep track of the order or sequence of data packet, (this is to counter high message latency and loss which results in messages usually arriving in non-sequential order). So the basic purpose of allotting sequence numbers is to ensure reaches the user in the correct order, regardless of the order in which the data is actually received (CERT nd.). This allotment takes place during the initial phase of the TCP connection which is called the three-way handshake. The process can be detailed as follows:
1. The originator of the connection initiates the connection by sending a packet having the SYN flag set in the TCP header - the "SYN packet".
2. The receiver or the target responds by sending back to the originator a packet that has the SYN and ACK flags set - "SYN/ACK packet"
3. The originator acknowledges receipt of the 2nd packet by sending to the receiver a third packet with only the ACK flag set (an "ACK packet").
After the completion of this three-step handshaking process the TCP connection is considered "open" and data transfer can take place between the two systems. Herein lies the loophole, after sending the SYN-ACK packet (between steps 2 and 3), the receiving system is required to wait for the ACK packet and keep a record of the incomplete connection in a queue called "listen queue". The listen queue allows successful connections even with high message latency and is necessary. Most hardware's only have a limited amount of space for such incomplete records. If the receiver gets further requests for new connections while too many connections are left in the incomplete state, the receiver will run out of space, and new connection requests can not be handled.
In a SYN flood DOS attack, a malicious host or the attacker sends a large number of SYN packets 'only', while holding out or not replying with the corresponding ACK packet response to the ...Show more


Denial of Service (DoS) attacks on Internet-connected systems can be particularly virulent. Agreed. DoS attacks can be termed both primitive and deadly. It is one of those diseases of the computer world that have been around for quite some time (in fact it is amongst the earliest and most well-known)…
Author : lebsacknoemy
Internet Security. The inherent weaknesses of the TCP/IP protocols essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Internet Security. The inherent weaknesses of the TCP/IP protocols"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

The security strengths and weaknesses of the Internet
Internet security is a type of security related to the internet. The main purpose behind implementing internet security measures are to reduce the occurrence of risks and threats related to transfer of information over the internet. Internet security provides various significant benefits to the internet users.
6 pages (1500 words) Essay
Cyber Security Vulnerabilities
NO matter how advanced the security controls are, still incidents and security breaches are on the rise. There are numerous cases where IT managers have failed to provide or define adequate security for enterprise wide infrastructure of an organization. Likewise, they emphasize more or external security threats rather than internal vulnerabilities.
14 pages (3500 words) Essay
Anonymity and Networks Essay
Three types of Internet anonymity include full anonymity and pseudonymity. Many internet anonymity systems have some flaws which allow eavesdroppers to access personal information. Internet anonymity is offered through anonymous servers and anonymous internet users.
9 pages (2250 words) Essay
Internet Security
Web Security. Web security or internet security is a subdivision of computer science, which precisely shares the internet, and typically encompasses the browser safety but similarly the network security. Web safety correspondingly comprises additional presentations or operating systems.
5 pages (1250 words) Essay
Denial of Service Attacks
This is not to say that there are no preventive measures but the preventive measures do not undermine the potency of DoS attacks. Quite simply a denial-of-service attack attempts to make computer resources unavailable to its intended users. DoS attacks are usually targeted at major websites or services hosted on high-profile web servers such as banks, credit card payment gateways or even DNS root servers.
4 pages (1000 words) Essay
Security in Wireless Protocols
For instance, wireless local area network (WLAN) devices, allow users to take the laptops from one department to other within the locality without losing network connectivity. But risks are natural in any wireless
3 pages (750 words) Essay
IP address design and planning is a network management task that has to be well structured and regularly conducted to monitor the progress of the organization’s technology growth. The IP addressing scheme of the First
1 pages (250 words) Essay
Compare the OSI model with the TCP/IP (DoD) model
The process layer defines the protocols which help in the implementation of the user-level applications. The host-to-host layer deals with the management and connection of data flow as well as retransmission of the lost data. The Internet layer transfers the
1 pages (250 words) Essay
Attack metholodgies ( network security )
mputer systems attackers and hackers were doing it for the fun of enjoying their prowess in managing to tamper and penetrate through established network security systems. However, the modern objective for computer systems and network security attacks has changed from that of fun
7 pages (1750 words) Essay
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
Comments (0)
Click to create a comment
Contact Us