Professional Documents
Culture Documents
Network Security
Information Security by Van K Nguyen
Sep 2009 Hanoi University of Technology 2
Attacks against TCP
n Configuration Optimization
q At the server
n Reduce the timeout to 10 seconds
n Increase the size of the queue
n Disable non-essential services, reducing the number of
ports to be attacked
q At all routers in the Internet
n Block packets to the outside that have source addresses
from outside the internal network
} 2 layer protocol
n Session
q association between a client and a server
q created by the Handshake Protocol
q defines secure cryptographic parameters that can
be shared by multiple connections.
n Connection
q end-to-end reliable secure communication
q every connection is associated with a session