CFP last date
22 April 2024
Reseach Article

TCP/IP Data Normalization

Published on February 2013 by Smita Verma, Garima Krishna
International Conference on Advances in Computer Application 2013
Foundation of Computer Science USA
ICACA2013 - Number 1
February 2013
Authors: Smita Verma, Garima Krishna
92520549-e222-475b-8f36-780e68f6a5d7

Smita Verma, Garima Krishna . TCP/IP Data Normalization. International Conference on Advances in Computer Application 2013. ICACA2013, 1 (February 2013), 59-62.

@article{
author = { Smita Verma, Garima Krishna },
title = { TCP/IP Data Normalization },
journal = { International Conference on Advances in Computer Application 2013 },
issue_date = { February 2013 },
volume = { ICACA2013 },
number = { 1 },
month = { February },
year = { 2013 },
issn = 0975-8887,
pages = { 59-62 },
numpages = 4,
url = { /proceedings/icaca2013/number1/10398-1018/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Computer Application 2013
%A Smita Verma
%A Garima Krishna
%T TCP/IP Data Normalization
%J International Conference on Advances in Computer Application 2013
%@ 0975-8887
%V ICACA2013
%N 1
%P 59-62
%D 2013
%I International Journal of Computer Applications
Abstract

Defending networks against today's attackers is especially challenging for modern intrusion detection/prevention systems for two reasons: the sheer amount of state they must maintain, and the possibility of resource exhaustion attacks on the defense system itself. Our work shows how to cope with these challenges in the context of a TCP stream normalizer whose job is to detect all instances of inconsistent TCP retransmissions.

References
  1. M. Handley,V. Paxson, and C. Kreibich, "Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics," in Proc. USENIX Security Symposium, Aug. 2001.
  2. G. Varghese, J. A. Fingerhut, and F. Bonomi, "Detecting Evasion Attacks at High Speeds without Reassembly," in Proc. ACM SIGCOMM, Sept. 2006.
  3. "Configuring TCP Normalization," 2006, http://www. cisco. com/en/US/products/ps6120/products configuration guide chapter09186a008054ecb8. html#wp1051891.
  4. Mythili Vutukuru, H. Balakrishnan, "Efficient and Robust TCP Stream Normalization", IEEE Symposium on Security and Privacy, May 2008.
  5. Anderson, Ross (2008). "Security Engineering – A Guide to Building Dependable Distributed Systems – 2nd edition. John Wiley & Sons.
  6. Burns, David (2011). "CCNP Security IPS 642-627 Official Cert Guide". Cisco Press.
  7. Thomas H. Ptacek, Timothy N. Newsham, "Insertion, Evasion and denial of service: Eluding Network Intrusion Detection". Jan 1998.
  8. Tanenbaum, Andrew S. , "Computer Networks" 4th edition. Pearson Education. "Secure Hash Standard", FIPS – 180, National Institute of Standards and Technology.
Index Terms

Computer Science
Information Sciences

Keywords

Tcp Ip Data Normalization