International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112

Research Paper | Information Technology | India | Volume 4 Issue 3, March 2015


Securing TCP/IP Stacks Using IP Tables

Hamisu I. Usman | J. Dharani [3]


Abstract: - The Transmission Control Protocol/Internet Protocol (TCP/IP) suite has become a widely method of interconnecting hosts, networks, and the internet at large. The TCP/IP protocol suite is vulnerable to a variety of attacks ranging from password sniffing to devastating attacks such as denial of service (DoS), and one thing that makes this attack successful is that most of the software uses to carry out those type of attacks are freely available on the internet. A DoS attack is an attempt by an attacker to flood a users or an organizations system. There are two main categories of DoS attacks. DoS attacks can be either sent by a single system to a single target (simple DoS) or sent by many systems to a single target (DDoS). The goal of DoS isnt to gain unauthorized access to machines or data, but to prevent legitimate users of a service from using it.


Keywords: TCP/IP, DoS, Sniffing, Internet, Flooding


Edition: Volume 4 Issue 3, March 2015,


Pages: 2049 - 2054


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Hamisu I. Usman, J. Dharani, "Securing TCP/IP Stacks Using IP Tables", International Journal of Science and Research (IJSR), Volume 4 Issue 3, March 2015, pp. 2049-2054, https://www.ijsr.net/get_abstract.php?paper_id=SUB152347

Similar Articles with Keyword 'DoS'

Downloads: 126

Research Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 1142 - 1145

Intrusion Detection Using Data Mining Approach

Kamble Jayshree R. | Rangdale S.P.

Share this Article

Downloads: 142

Research Paper, Information Technology, Kenya, Volume 7 Issue 3, March 2018

Pages: 1355 - 1362

Development of a Hybrid Intrusion Detection System for Security Analysis at the IP Layer

Arphaxad Kioko Muia

Share this Article
Top