IJISC
  • Indexed in

  • Latest News

    December 30, 2024
    Volume 13, Issue 2 of the International Journal of Information Security and Cybercrime was published
    July 1, 2024
    Volume 13, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 27, 2023
    Volume 12, Issue 2 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Types of Threats and Appropriate Countermeasures for Internet Communications


    Author(s): BACÎŞ, Irina-Bristena

    Quick view | Full article | Citations | Views: 299


    Author(s) keywords: ,


    Reference keywords: ,


    Abstract:

    Threats can translate into various types of attacks an intruder can take on entities in a network: flooding the target with protocol messages, smurfing (targeted broadcasting of an ICMP protocol-based messaging protocol), distributed attacks that lead to blocking the service for legitimate users, IP address theft and flooding targets with unsolicited emails, identity theft, or fraudulent routing. Against these threats, a variety of security measures can be implemented, such as: configuration management, firewall installation, intrusion detection system installation. Used separately or together, these protection measures can eliminate or even minimize the probability of materializing security threats and preventing attacks on the security features of a system.



    References:

    [1]. CEC DG-XIII INFOrmation SECurity Task S2001 (INFOSEC Task S2001).
    [2]. Computer Emergency Response Team (CERT): www.cert.org.
    [3]. Rachieru, D., ş.a.: Lucrarea PN 03 34 03 01: “Metode de asigurare a confidenţialităţii comunicaţiilor de date, în conformitate cu reglementările europene”, faza 4: “Metode de asigurare a securităţii comunicaţiilor în reţelele IP şi ATM”, decembrie 2004, INSCC.
    [4]. Bellovin, S.: “Security Problems in the TCP / IP Protocol Suite”, Computer Communications Review, May 1989.
    [5]. Eastlake D., Kaufman C.: “Domain Name System Security Extensions” - RFC 2065, Jan. 1997.
    [6]. Schneier B.: “Applied Cryptography”, 2nd edition, John Wiley & Sons, New York, 1995.
    [7]. Atkinson R.: “Security Architecture for the Internet Protocol”, RFC 1825, Aug. 1995.
    [8]. Heidari, M.: “IPv6 Security Considerations” - Jun. 2004 - www.securitydocs.com/library/2757.
    [9]. Wasserman, M.: “IPv6 and Network Security” - developer.windriver.com/resources/articles/06-2003-00.html.
    [10]. Kanda, M.: “IPSec: a basis for IPv6 security”, Toshiba Research and Development Center Paper, Jul. 2004.
    [11]. Saita, A.: “Routing Security: Falling behind IPv6”, Sep. 2004 - searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1004943,00.html.
    [12]. Haeni, Reno: “Can IPv6 replace SSL?” - rootprompt.org/article.php3?article=486.
    [13]. IETF RFC 1577: “Classical IP and ARP over ATM”.
    [14]. IETF RFC 1483: “Multiprotocol Encapsulation over ATM Adaptation Layer 5”.
    [15]. Benecke Carsten, Ellermann Uwe: “Securing Classical IP over ATM Networks” - Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas, Jan. 1998.
    [16]. Xu Jun: “IP over ATM: Classical IP, NHRP, LANE, MPOA, PAR and I-PNNI” - Ohio State University Paper - http://www.cis.ohio-state.edu/~jain/cis788-97/ip_over_atm/index.htm.



    Additional Information

    Article Title: Types of Threats and Appropriate Countermeasures for Internet Communications
    Author(s): BACÎŞ, Irina-Bristena
    Date of Publication: 2021-06-29
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2021.01.03
    Issue: Volume 10, Issue 1, Year 2021
    Section: Studies and Analysis of Cybercrime Phenomenon
    Page Range: 27-37 (11 pages)



    Copyright ©2012-2025
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.