Survey on evolving threats in TCP/IP header attacks: Emerging trends and future directions DOI Creative Commons

Winnie Owoko

World Journal of Advanced Engineering Technology and Sciences, Journal Year: 2024, Volume and Issue: 11(2), P. 454 - 475

Published: April 18, 2024

The TCP/IP protocol suite, a cornerstone of modern networking, faces escalating threats from evolving attack vectors targeting its headers. This survey explores emerging trends in header attacks, assessing their potential impact and outlining future directions for defense strategies. By scrutinizing recent research real-world incidents, the paper aims to offer insights into threat landscape provide recommendations enhancing network security. Key areas investigation include historical evolution vulnerabilities, adaptation attackers' techniques over time, development novel mechanisms counteract these threats. underscores critical importance understanding attacks contemporary cybersecurity highlights necessity proactive measures safeguard infrastructures. addressing challenges posed by identifying further development, this contributes ongoing efforts strengthen defenses mitigate risks associated with cyber protocols.

Language: Английский

Enhancing Security Mechanisms for IoT-Fog Networks DOI Open Access
Salah-Eddine Mansour, Abdelhak Sakhi, Larbi Kzaz

et al.

Journal of Robotics and Control (JRC), Journal Year: 2024, Volume and Issue: 5(1), P. 152 - 159

Published: Jan. 24, 2024

This study contributes to improving Morocco's fish canning industry by integrating artificial intelligence (AI). The primary objective involves developing an AI and image processing-based system monitor guarantee process quality in the facility. It commenced with IoT-enabled device capable of capturing processing images, leading creation AI-driven adept at accurately categorizing improperly crimped cans. Further advancements focused on reinforcing communication between IoT devices servers housing individual client's neural network weights. These weights are vital, ensuring functionality our device. efficiency cans relies updated from Fog server, crucial for continual refinement adaptation diverse can shapes. Securing integrity server is imperative avoid disruptions classification, emphasizing need secure channels. In this paper, key scientific contribution revolves around devising a security protocol founded HMAC. guarantees authentication preserves exchanged computing nodes devices. innovative addition comprehensive dictionary within significantly bolsters measures, enhancing overall safety these interconnected entities.

Language: Английский

Citations

2

Survey on evolving threats in TCP/IP header attacks: Emerging trends and future directions DOI Creative Commons

Winnie Owoko

World Journal of Advanced Engineering Technology and Sciences, Journal Year: 2024, Volume and Issue: 11(2), P. 454 - 475

Published: April 18, 2024

The TCP/IP protocol suite, a cornerstone of modern networking, faces escalating threats from evolving attack vectors targeting its headers. This survey explores emerging trends in header attacks, assessing their potential impact and outlining future directions for defense strategies. By scrutinizing recent research real-world incidents, the paper aims to offer insights into threat landscape provide recommendations enhancing network security. Key areas investigation include historical evolution vulnerabilities, adaptation attackers' techniques over time, development novel mechanisms counteract these threats. underscores critical importance understanding attacks contemporary cybersecurity highlights necessity proactive measures safeguard infrastructures. addressing challenges posed by identifying further development, this contributes ongoing efforts strengthen defenses mitigate risks associated with cyber protocols.

Language: Английский

Citations

0