Subsequent packet having a non-zero offset

Assignment Help Basic Computer Science
Reference no: EM131204509

RFC 791, the IPv4 protocol specification, describes a reassembly algorithm that results in new fragments overwriting any overlapped portions of previously received fragments. Given such a reassembly implementation, an attacker could construct a series of packets in which the lowest (zero-offset) fragment would contain innocuous data (and thereby be passed by administrative packet filters), and in which some subsequent packet having a non-zero offset would overlap TCP header information (destination port, for instance) and cause it to be modified. The second packet would be passed through most filter implementations because it does not have a zero fragment offset. Suggest a method that could be used by a packet filter to counter this attack.

Reference no: EM131204509

Questions Cloud

How research questions were supported by your research : Study Results: In 50-100 words, state your research questions, describe how they were supported by your research, and then include visuals (e.g., graphic/charts/diagrams) to illustrate the parts or results of your study.
Describe aspects of your profession in human services field : Describe the aspects of your profession in human services field as the general applications that may apply most or all other humn service profssions.
Show that the resulting provision of public good is optimal : What would be the provision of public good if the decision were taken by a majority vote, assuming that the cost is equally shared in the event of public good provision? Compare your answer with part b, and interpret the difference.
Size of the payload in the first fragment : In an IPv4 packet, the size of the payload in the first fragment, in octets, is equal to Total Length - (4 × IHL). If this value is less than the required minimum (8 octets for TCP), then this fragment and the entire packet are rejected. Suggest a..
Subsequent packet having a non-zero offset : The second packet would be passed through most filter implementations because it does not have a zero fragment offset. Suggest a method that could be used by a packet filter to counter this attack.
How do the above marketing efforts influence people : Gladwell argues that marketing research techniques like focus groups are not effective because we usually react to products quickly and without much conscious thought. So, it's better to solicit consumers' first impressions rather than getting the..
Process and ways to handle problems : As part of the training process, your manager would like to evaluate how effective you are at this task, and asked that you complete a project: creating a three-part manual that shows a user how to build a computer, using a list of specifications...
Isostructural species are those which have the same shape : Isostructural species are those which have the same shape and hybridization. Among the given species identify the isostructural pairs. Hydrogen bonds are formed in many compounds e.g. H2O, HF ,NH3. The boiling point of such compounds depends to a lar..
How does behavior-blocking software work : How does behavior-blocking software work? In general terms, how does a worm propagate?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Bringing t into the fundamental domain

Let T = (9 + i )/ 10.Find the transformation in the modular group that brings it into a point To of the fundamental domain :F0 • Show that the transformation is unique by proving that there is no transformation  in the modular group (except  the id..

  Determine the force in each spring required to transmit

The coefficient of static friction between A and B is µ=0.3 .

  Analyzing complex formulas using evaluate formula

In this project, you will finalize a gradebook by entering formulas to compute final grades and class statistics. Analyzing Complex Formulas Using Evaluate Formula

  Program needs to be in pseudocode

Need help Designing a program that lets the user enter the total rainfall for each of 12 months into an array. The program should calculate and display the total rainfall for the year, the average monthly rainfall, and the months with the highest and..

  Special type of diagrams called uml diagrams

We will be using software to draw a special type of diagrams called UML diagrams that represent software architecture. There are many types that are open source and available for free download.

  Standards used to represent music in a digital format

Which is not a way a mouse might connect to the computer?

  Compare and contrast the categories

Identify two such Data Classification Models and then compare and contrast the categories they use for the various levels of classification.

  Why secure wireless lan architecture is important

Please enhance and elaborate on why Secure wireless LAN architecture is important. Please show references

  Explain the results of the improvements you recommended

Post:Name the product and the associated password management protocol you selected. Analyse the good and bad practices of this protocol.

  Disposal of technology devices and gadgets

This assignment requires you to use more presentation tools and allows you to be creative. It switches gears and addresses the disposal of our technology devices and gadgets.

  How many types of datastores are present in data services

How many types of datastores are present in Data services?

  Create a windows application to determine how many months

Create a Windows application to determine how many months

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd