This commit is contained in:
Trance-0
2026-01-23 12:26:56 -06:00
parent 05602ed70d
commit 0c526a4983
3 changed files with 30 additions and 1 deletions

View File

@@ -31,7 +31,7 @@ Domain names for the application/human layer
- E.g., www.wustl.edu - E.g., www.wustl.edu
![TCP Protocol Stack](https://notenextra.trance-0.com/CSE4303/TCP-protocol-stack.png) ![TCP Protocol Stack](https://notenextra.trance-0.com/CSE4303/TCP-protocal-stack.png)
![Data Formats](https://notenextra.trance-0.com/CSE4303/Network-data-formats.png) ![Data Formats](https://notenextra.trance-0.com/CSE4303/Network-data-formats.png)

View File

@@ -0,0 +1,27 @@
# CSE4303 Introduction to Computer Security (Lecture 4)
## Network attacks
### Examining the transport layer
#### Transmission Control Protocol (TCP)
Connection-oriented, preserves order
- Sender
- Break data into packets
- Attach packet numbers
- Receiver
- Acknowledge receipt; lost packets are resent
- Reassemble packets in correct order
#### Security Problems
1. Network packets pass by untrusted hosts
- Eavesdropping, packet sniffing
- Especially easy when attacker controls a machine close to victim (e.g. WiFi routers)
2. TCP state easily obtained by eavesdropping
- Enables spoofing and session hijacking
3. Denial of Service (DoS) vulnerabilities

View File

@@ -6,4 +6,6 @@ export default {
CSE4303_L1: "Introduction to Computer Security (Lecture 1)", CSE4303_L1: "Introduction to Computer Security (Lecture 1)",
CSE4303_L2: "Introduction to Computer Security (Lecture 2)", CSE4303_L2: "Introduction to Computer Security (Lecture 2)",
CSE4303_L3: "Introduction to Computer Security (Lecture 3)", CSE4303_L3: "Introduction to Computer Security (Lecture 3)",
CSE4303_L4: "Introduction to Computer Security (Lecture 4)",
} }