Subsequent packet having a non-zero offset

Assignment Help Basic Computer Science
Reference no: EM131204509

RFC 791, the IPv4 protocol specification, describes a reassembly algorithm that results in new fragments overwriting any overlapped portions of previously received fragments. Given such a reassembly implementation, an attacker could construct a series of packets in which the lowest (zero-offset) fragment would contain innocuous data (and thereby be passed by administrative packet filters), and in which some subsequent packet having a non-zero offset would overlap TCP header information (destination port, for instance) and cause it to be modified. The second packet would be passed through most filter implementations because it does not have a zero fragment offset. Suggest a method that could be used by a packet filter to counter this attack.

Reference no: EM131204509

Questions Cloud

How research questions were supported by your research : Study Results: In 50-100 words, state your research questions, describe how they were supported by your research, and then include visuals (e.g., graphic/charts/diagrams) to illustrate the parts or results of your study.
Describe aspects of your profession in human services field : Describe the aspects of your profession in human services field as the general applications that may apply most or all other humn service profssions.
Show that the resulting provision of public good is optimal : What would be the provision of public good if the decision were taken by a majority vote, assuming that the cost is equally shared in the event of public good provision? Compare your answer with part b, and interpret the difference.
Size of the payload in the first fragment : In an IPv4 packet, the size of the payload in the first fragment, in octets, is equal to Total Length - (4 × IHL). If this value is less than the required minimum (8 octets for TCP), then this fragment and the entire packet are rejected. Suggest a..
Subsequent packet having a non-zero offset : The second packet would be passed through most filter implementations because it does not have a zero fragment offset. Suggest a method that could be used by a packet filter to counter this attack.
How do the above marketing efforts influence people : Gladwell argues that marketing research techniques like focus groups are not effective because we usually react to products quickly and without much conscious thought. So, it's better to solicit consumers' first impressions rather than getting the..
Process and ways to handle problems : As part of the training process, your manager would like to evaluate how effective you are at this task, and asked that you complete a project: creating a three-part manual that shows a user how to build a computer, using a list of specifications...
Isostructural species are those which have the same shape : Isostructural species are those which have the same shape and hybridization. Among the given species identify the isostructural pairs. Hydrogen bonds are formed in many compounds e.g. H2O, HF ,NH3. The boiling point of such compounds depends to a lar..
How does behavior-blocking software work : How does behavior-blocking software work? In general terms, how does a worm propagate?

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  What is inheritance

A. What is inheritance ?B.  What are different forms of inheritance?C. Give one example of single level inheritance in C++

  Main ways to interface with the database

There are 2 main ways to interface with the database: using stored procedures or passing in the raw queries directly. If the class scheduler needed a screen to search for students, how might each approach be used?

  Different types of session hijacking

Question 1: Describe different types of session hijacking. Also research session hijacking on internet and see if you can find a case where session hijacking was successfully used to perform an attack against a system. Include references in your a..

  Illustrate strategies-methodologies to accomplish

Given a requirement to integrate WDAs into an Enterprise Intranet, what are 2 applications that would be candidates for that, and illustrate strategies/methodologies to accomplish that.

  Why they should not be placed at a higher or lower level

Explain why they should not be placed at a higher or lower level.

  Fractions from the equation first

Solve the equation and show the check of your solution(s). If an answer is an excluded value, please state that on your paper. Clear fractions from the equation first.

  Safeguards against unreasonable searches and seizures

In this assignment, you need to work on the Fourth Amendment. Before starting on the assignment, make sure that you read about the Fourth Amendment and understand the nature/features of this amendment related to privacy. The Fourth Amendment safeguar..

  The president is doing a good job

Add formats for Age (0-30, 31-50, 51-70, 71+), Party (D = Democrat, R = Republican), and Ques1-Ques4 (1=Strongly Disagree, 2=Disagree, 3=No Opinion, 4=Agree, 5=Strongly Agree)

  Secure data access and encryption of a patientdatabase

OverviewIn this lab, you implemented policies that map to the Sarbanes-Oxley Act (SOX), the PaymentCard Industry Data Security Standard (PCI-DSS), and the Health Insurance Portability andAccountability Act (HIPAA). You ensured secure data acce..

  Determine the number of registers or stack locations

Illustrate your technique on the following expression ((A+B)+(C+D))+((E+F)+(G+H))

  Display the players name and team name

The Midville Park District maintains a file named Soccer.rec containing information's about players on its soccer teams. The record contains a player's first name, last name and team number. The teams are:

  Impact of development of us economic system

Elaborate on creating socio-economic spaces in its broadest sense and the role and impact of the development of the US economic system as it pertains to the paradox of limitations and freedoms in the paradox between capitalism and democracy.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd