Specification-Based Classification of Network Protocol Vulnerabilities
Autor: | I. V. Alekseev, Peter D. Zegzhda |
---|---|
Rok vydání: | 2020 |
Předmět: |
021110 strategic
defence & security studies Computer science 0211 other engineering and technologies Vulnerability 02 engineering and technology Computer security computer.software_genre Field (computer science) Market fragmentation Control and Systems Engineering Signal Processing 0202 electrical engineering electronic engineering information engineering 020201 artificial intelligence & image processing Layer (object-oriented design) Communications protocol computer Software Ip address |
Zdroj: | Automatic Control and Computer Sciences. 54:922-929 |
ISSN: | 1558-108X 0146-4116 |
Popis: | An overview of network attacks and vulnerabilities of the TCP/IP model with respect to each layer is given using a number of protocols as an example. The purpose of this study is to identify the most common types of network protocol vulnerabilities that are based on an intruder’s incorrect use of fields defined by specifications. For example, the ability to change the value of the IP address field to the victim’s address is not an unspecified vulnerability, while the incorrect exploitation of the fragmentation flags is. |
Databáze: | OpenAIRE |
Externí odkaz: |