ABSTRACT

This chapter is the first of two chapters that focus on the TCP/IP protocols examining some of the “generic” TCP/IP exploits and denial-of-service attacks and defenses against them. Specific protocol material is deferred to later chapters (routing protocols, for example, are addressed in the chapter on network hardware), with this chapter focusing on some of the fundamental vulnerabilities in TCP/IP that are exploited by attackers and the ongoing IP security initiatives intended to address these.