Indian Journal of Science and Technology
DOI: 10.17485/ijst/2016/v9i40/98588
Year: 2016, Volume: 9, Issue: 40, Pages: 1-6
Original Article
G. Ranjith, J. Vijayachandra* , B. Prathusha and P. Sagarika
Department of CSE, Warangal Institute of Technology and Sciences, Warangal – 506342, Telangana, India; [email protected]
[email protected]
[email protected]
[email protected]
*Author for correspondence
Vijayachandra
Department of CSE
Email:[email protected]
Data and Information Security are the major concerns in the modern network world. The most widely used and reliable transport protocol is TCP over internet. As it is most widely used network, which is facing a security breach from the TCP injection Attacks. We discussed different attacks such as Spoofing Attacks, IP Address Spoofing Attacks, ARP Spoofing Attacks, Man–in Middle Attacks, TCP-Session Hijacking and even we concentrated on Advanced Persistent Threat. We exposed different security measures against packet sniffing, packet modification and IP Spoofing. The mathematical analysis is given for the authentication mechanism to protect the data from the different risks, threats and attacks. We also focused different security measures and protocols at transport level such as secure sockets layer and transport layer security protocols. We designed and implemented the defense system to protect against the Advanced Persistent Threat and other attacks, and research issues in networks and Cloud Computing. An experimental analysis is given along with In-depth analytics and mechanisms regarding the threats in transit and TCP Session Hijacking. Network data and information security methods such as packet filters design methods and implementation are provided along with the mathematical analysis and experimental output.
Keywords: Advanced Persistent Threat, Defense in Depth, Multi-path TCP, TCP-Injection Attack
Subscribe now for latest articles and news.