Subsequent packet having a non-zero offset

Assignment Help Basic Computer Science
Reference no: EM131204509

RFC 791, the IPv4 protocol specification, describes a reassembly algorithm that results in new fragments overwriting any overlapped portions of previously received fragments. Given such a reassembly implementation, an attacker could construct a series of packets in which the lowest (zero-offset) fragment would contain innocuous data (and thereby be passed by administrative packet filters), and in which some subsequent packet having a non-zero offset would overlap TCP header information (destination port, for instance) and cause it to be modified. The second packet would be passed through most filter implementations because it does not have a zero fragment offset. Suggest a method that could be used by a packet filter to counter this attack.

Reference no: EM131204509

Questions Cloud

How research questions were supported by your research : Study Results: In 50-100 words, state your research questions, describe how they were supported by your research, and then include visuals (e.g., graphic/charts/diagrams) to illustrate the parts or results of your study.
Describe aspects of your profession in human services field : Describe the aspects of your profession in human services field as the general applications that may apply most or all other humn service profssions.
Show that the resulting provision of public good is optimal : What would be the provision of public good if the decision were taken by a majority vote, assuming that the cost is equally shared in the event of public good provision? Compare your answer with part b, and interpret the difference.
Size of the payload in the first fragment : In an IPv4 packet, the size of the payload in the first fragment, in octets, is equal to Total Length - (4 × IHL). If this value is less than the required minimum (8 octets for TCP), then this fragment and the entire packet are rejected. Suggest a..
Subsequent packet having a non-zero offset : The second packet would be passed through most filter implementations because it does not have a zero fragment offset. Suggest a method that could be used by a packet filter to counter this attack.
How do the above marketing efforts influence people : Gladwell argues that marketing research techniques like focus groups are not effective because we usually react to products quickly and without much conscious thought. So, it's better to solicit consumers' first impressions rather than getting the..
Process and ways to handle problems : As part of the training process, your manager would like to evaluate how effective you are at this task, and asked that you complete a project: creating a three-part manual that shows a user how to build a computer, using a list of specifications...
Isostructural species are those which have the same shape : Isostructural species are those which have the same shape and hybridization. Among the given species identify the isostructural pairs. Hydrogen bonds are formed in many compounds e.g. H2O, HF ,NH3. The boiling point of such compounds depends to a lar..
How does behavior-blocking software work : How does behavior-blocking software work? In general terms, how does a worm propagate?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd