[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article
Free access

Security issues with TCP/IP

Published: 20 June 1995 Publication History

Abstract

An introduction to network security, basic definitions and aa brief discussion of the architecture of TCP/IP as well as the Open System Intercornnection(OSI) Reference Model open the paper. The relationship between TCP/IP and of some OSI layers is described. An indepth look is provided to the major protocols in TCP/IP suite and the security features and problems in this suite of protocols. The secutiy problems are discussed in the context ofthe protocol services.

References

[1]
[1] William R. Cheswick, Steven M. Bellovin, Firewalls and Internet Security: Repelling the Wily Hacker, Addison-Wesley Publishing Company, 1994.
[2]
[2] Sidnie Feit, TCP/IP: Architecture, Protocols, and Implementation, McGraw-Hall, Inc., 1993.
[3]
[3] Uyless Black, TCP/IP and Related Protocols, McGraw-Hall, Inc., 1992.
[4]
[4] Craig Hunt, TCP/IP Network Administration, O'Reilly & Associates, Inc., 1992.
[5]
[5] Thomas W. Madron, Network Security in the '90s: Issues and Solutions for Managers, John Wiley & Sons, Inc., 1992.
[6]
[6] Steven L. Shaffer, Alan R. Simon, Network Security, AP Professional, 1994.
[7]
[7] Charles P. Pfleeger, Security in Computing, Prentice Hall, Inc., 1989.
[8]
[8] Michael Padovano, Networking Applications on UNIX System V Release 4, Prentice Hall, Inc., 1993.

Cited By

View all
  • (2024)Drawing the Boundaries Between Blockchain and Blockchain-Like Systems: A Comprehensive Survey on Distributed Ledger TechnologiesProceedings of the IEEE10.1109/JPROC.2024.3386257112:3(247-299)Online publication date: Mar-2024

Index Terms

  1. Security issues with TCP/IP

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM SIGAPP Applied Computing Review
    ACM SIGAPP Applied Computing Review  Volume 3, Issue 1
    Special issue on security
    Summer 1995
    29 pages
    ISSN:1559-6915
    EISSN:1931-0161
    DOI:10.1145/214310
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 20 June 1995
    Published in SIGAPP Volume 3, Issue 1

    Check for updates

    Author Tags

    1. TCP/IP
    2. Unix
    3. network security
    4. security

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)134
    • Downloads (Last 6 weeks)11
    Reflects downloads up to 09 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Drawing the Boundaries Between Blockchain and Blockchain-Like Systems: A Comprehensive Survey on Distributed Ledger TechnologiesProceedings of the IEEE10.1109/JPROC.2024.3386257112:3(247-299)Online publication date: Mar-2024

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media