TCP/IP stack transport layer performance, privacy, and security issues
Jaramogi Oginga Odinga University of Science and Technology, Bondo, Kenya.
Review
World Journal of Advanced Engineering Technology and Sciences, 2024, 11(02), 175–200.
Article DOI: 10.30574/wjaets.2024.11.2.0098
Publication history:
Received on 01 February 2024; revised on 13 March 2024; accepted on 15 March 2024
Abstract:
Transmission Control Protocol/ Internet Protocol (TCP/IP) is the backbone of Internet transmission. The Transport Layer of the TCP/IP stack, which includes TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols, plays a crucial role in ensuring reliable communication between devices over a network. To come up with measures that make networks more secure, it is important to learn about the vulnerabilities that exist in the transport TCP/IP stack and then have an understanding of the typical attacks carried out in such layer. This paper explores how the TCP Protocol works, the TCP/IP 3 Way Handshake, TCP Header Structure, the typical vulnerabilities and the classical attacks of transport layer TCP/IP, tools, and solutions adopted to prevent and reduce the chances of some of these attacks. The findings indicated that the major TCP/ IP stack transport layer threats include Finger printing, SYN Flood, TCP reassembly and sequencing, IP Spoofing, TCP session hijacking, RST and FIN denial of service attack, Ping of Death, Low Rate/ Shrew Attacks. Their preventive measures and mechanisms are discussed.
Keywords:
TCP; TLS; Encryption; TCP Header; SYN; ACK.
Full text article in PDF:
Copyright information:
Copyright © 2024 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0