Types of Threats and Appropriate Countermeasures for Internet Communications
Author(s): BACÎŞ, Irina-Bristena
Author(s) keywords: attacks, security measures
Reference keywords: cyber-attacks, cybersecurity
Abstract:
Threats can translate into various types of attacks an intruder can take on entities in a network: flooding the target with protocol messages, smurfing (targeted broadcasting of an ICMP protocol-based messaging protocol), distributed attacks that lead to blocking the service for legitimate users, IP address theft and flooding targets with unsolicited emails, identity theft, or fraudulent routing. Against these threats, a variety of security measures can be implemented, such as: configuration management, firewall installation, intrusion detection system installation. Used separately or together, these protection measures can eliminate or even minimize the probability of materializing security threats and preventing attacks on the security features of a system.
References:
[1]. CEC DG-XIII INFOrmation SECurity Task S2001 (INFOSEC Task S2001).
[2]. Computer Emergency Response Team (CERT): www.cert.org.
[3]. Rachieru, D., ş.a.: Lucrarea PN 03 34 03 01: “Metode de asigurare a confidenţialităţii comunicaţiilor de date, în conformitate cu reglementările europene”, faza 4: “Metode de asigurare a securităţii comunicaţiilor în reţelele IP şi ATM”, decembrie 2004, INSCC.
[4]. Bellovin, S.: “Security Problems in the TCP / IP Protocol Suite”, Computer Communications Review, May 1989.
[5]. Eastlake D., Kaufman C.: “Domain Name System Security Extensions” - RFC 2065, Jan. 1997.
[6]. Schneier B.: “Applied Cryptography”, 2nd edition, John Wiley & Sons, New York, 1995.
[7]. Atkinson R.: “Security Architecture for the Internet Protocol”, RFC 1825, Aug. 1995.
[8]. Heidari, M.: “IPv6 Security Considerations” - Jun. 2004 - www.securitydocs.com/library/2757.
[9]. Wasserman, M.: “IPv6 and Network Security” - developer.windriver.com/resources/articles/06-2003-00.html.
[10]. Kanda, M.: “IPSec: a basis for IPv6 security”, Toshiba Research and Development Center Paper, Jul. 2004.
[11]. Saita, A.: “Routing Security: Falling behind IPv6”, Sep. 2004 - searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1004943,00.html.
[12]. Haeni, Reno: “Can IPv6 replace SSL?” - rootprompt.org/article.php3?article=486.
[13]. IETF RFC 1577: “Classical IP and ARP over ATM”.
[14]. IETF RFC 1483: “Multiprotocol Encapsulation over ATM Adaptation Layer 5”.
[15]. Benecke Carsten, Ellermann Uwe: “Securing Classical IP over ATM Networks” - Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas, Jan. 1998.
[16]. Xu Jun: “IP over ATM: Classical IP, NHRP, LANE, MPOA, PAR and I-PNNI” - Ohio State University Paper - http://www.cis.ohio-state.edu/~jain/cis788-97/ip_over_atm/index.htm.
Article Title: Types of Threats and Appropriate Countermeasures for Internet Communications
Author(s): BACÎŞ, Irina-Bristena
Date of Publication: 2021-06-29
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2021.01.03
Issue: Volume 10, Issue 1, Year 2021
Section: Studies and Analysis of Cybercrime Phenomenon
Page Range: 27-37 (11 pages)
Copyright ©2012-2025
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.