The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Data and Information Security are the major concerns in the modern network world. The most widely used and reliable transport protocol is TCP over internet. As it is most widely used network, which is facing a security breach from the TCP injection Attacks. We discussed different attacks such as Spoofing Attacks, IP Address Spoofing Attacks, ARP Spoofing Attacks, Man–in Middle Attacks, TCP-Session Hijacking and even we concentrated on Advanced Persistent Threat. We exposed different security measures against packet sniffing, packet modification and IP Spoofing. The mathematical analysis is given for the authentication mechanism to protect the data from the different risks, threats and attacks. We also focused different security measures and protocols at transport level such as secure sockets layer and transport layer security protocols. We designed and implemented the defense system to protect against the Advanced Persistent Threat and other attacks, and research issues in networks and Cloud Computing. An experimental analysis is given along with In-depth analytics and mechanisms regarding the threats in transit and TCP Session Hijacking. Network data and information security methods such as packet filters design methods and implementation are provided along with the mathematical analysis and experimental output.

Keywords

Advanced Persistent Threat, Defense in Depth, Multi-path TCP, TCP-Injection Attack.
User