To Study About the Content Analysis and Network Setup for Basic Understanding of Network Communication
| Vol-2 | Issue-8 | August 2017 | Published Online: 28 August 2017 PDF ( 795 KB ) | ||
| Author(s) | ||
| Devajit Mahanta 1; Dr. Ashish Chaturvedi 2 | ||
|
1Research Scholar, Kalinga University, Raipur, Chhattishgarh 2Associate Professor, Kalinga University, Raipur, Chhattishgarh |
||
| Abstract | ||
Some risks, such as viruses, worms, root kits, etc., have been found to cause no apparent change in the flow pattern on networks and can be recognized by matching the signatures via packet inspection. They are thus beyond the scope of this project, and for this project work, their capture is not included. It should be remembered, however, that these are effective weapons from which miscreants cause other forms of attacks, such as DoS, scanning, port flooding, etc., causing changes in flow patterns. Communication between the application and the IP is provided by TCP. It establishes a 3-way handshake link, transfers information, and then disconnects it with a 4-way handshake. The device does not send data after sending the FIN flag. The port remains open in listening mode until the ACK against the FIN flag is received. If the port is not open during link initialization, the device will send RST instead of sending ACK. During link termination, attackers may use the half-open technique vulnerability or send RST instead of ACK while the connection is being formed. In order to identify open ports, TCP scans are very common, which can subsequently be exploited to cause cyber attacks. By breaking the TCP connection into a client-to-attacker connection and an attacker-to-server connection, man-in-the-middle attacks can be enabled. In TCP links, data loss or data delivery out of order due to network congestion contributes to retransmission. In the case of anomalous cases, large numbers of malformed packets, duplicate packets and retransmissions are found. |
||
| Keywords | ||
| Computer Networks, Social Networking, Security, Applications, Information.. | ||
|
Statistics
Article View: 318
|
||

