QUESTION : Pick one of the networking layers described in the book, discuss 2 pr
ID: 3811837 • Letter: Q
Question
QUESTION: Pick one of the networking layers described in the book, discuss 2 protocols in that layer, and include a possible security flaw for those protocols. Back up your answers with either a) research paper discussing the flaw b) write a program which exposes the flaw.
These can be any type of security flaw, doesn't have to be DOS or MiM or ... ?? Anything!
Please use this chosen networking layer to complete the answer:
TRANSPORT LAYER: 2 protocols of interest:
-TCP (more service, more overhead)
-UDP (less service, less overhead)
Explanation / Answer
Transport layer is responsible for establishing connection sessions between two applications program and delivering data as requested by those applications . these received data by application to transport layer are further break into chunks called segments and send them to router for delivery . there are many protocols of transport layer some of them are TCP , UDP , DCCP , SCTP etc.
TCP ( transmission control protocol ) is used for applications in which reliable connections between hosts are necessary . TCP is bestknown transport protocol . it is used for connection oriented transmission . TCP can check Transmission error , lost packet , packets ot of order etc and automatically correc them . it also does flow control ..
UDP (user datagram protocol ) is used for non reliable transport protocol between applictions .with no sessions and flow control and optional error checking . UDP is much simpler messaging transmission than TCP . it is also faster than TCP and is suitable for VOIP or streaming video . it is used forvconnectionless transmission .
the security flaws for these two protocols are as Tcp break the data into packets and supplies some sequence those packets , but if the attacker can guess the next ssequence number , he can potentially hijack the tcp session .this means that if an attacker come in middle he can pose as you .
UDP are suspectiable to spoofing and DOS attack ( when attackers utilize the bandwidth and relative trust of large servers that provide the uDP protocol ) and spoofing can be done easily with UDP and not with TCP because to spoof an address across the internet thrugh tcp is not possible since handshake will never complete whereas in UDP there is no impllicit handshake are required .
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.