TCP/IP stack transport layer performance, privacy, and security issues

Oroo Oyondi Felix *

Jaramogi Oginga Odinga University of Science and Technology, Bondo, Kenya.
 
Review
World Journal of Advanced Engineering Technology and Sciences, 2024, 11(02), 175–200.
Article DOI: 10.30574/wjaets.2024.11.2.0098

 

Publication history: 
Received on 01 February 2024; revised on 13 March 2024; accepted on 15 March 2024
 
Abstract: 
Transmission Control Protocol/ Internet Protocol (TCP/IP) is the backbone of Internet transmission. The Transport Layer of the TCP/IP stack, which includes TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols, plays a crucial role in ensuring reliable communication between devices over a network. To come up with measures that make networks more secure, it is important to learn about the vulnerabilities that exist in the transport TCP/IP stack and then have an understanding of the typical attacks carried out in such layer. This paper explores how the TCP Protocol works, the TCP/IP 3 Way Handshake, TCP Header Structure, the typical vulnerabilities and the classical attacks of transport layer TCP/IP, tools, and solutions adopted to prevent and reduce the chances of some of these attacks. The findings indicated that the major TCP/ IP stack transport layer threats include Finger printing, SYN Flood, TCP reassembly and sequencing, IP Spoofing, TCP session hijacking, RST and FIN denial of service attack, Ping of Death, Low Rate/ Shrew Attacks. Their preventive measures and mechanisms are discussed.
 
Keywords: 
TCP; TLS; Encryption; TCP Header; SYN; ACK.
 
Full text article in PDF: