Analysis and Study of Network Security at Transport Layer

نویسندگان

  • Hiren Parmar
  • Atul Gosai
چکیده

In this technology era every applications depends on networks, it may be local or Internet, Intranet or Extranet, wired or wireless. All networks require strong security consideration to ensure confidentiality and integrity of communication. This paper discusses network security and related issued specifically at Transport layer, which enables true end to end communication between peers. As security is never 100%, security threats and vulnerability continues growing and becomes major concern for business and industries. Transport layer security concern with authentication, confidentiality, integrity and availability [1] [2]. In this paper we tried to discuss different security issues at transport layer, evaluating existing security mechanisms and standards. In fact, found the de-facto standards of web security used all over the world to secure e-commerce, onlinebanking are also found insecure. In other word, “security needs continuous improvement for better security”. Major security issues at presents are various kinds of man-in-themiddle (MITM) attacks, authentication related attacks, Distributed Denial of Service (DDoS) attacks and security association related attacks need serious considerations. Further gives direction on how to improve and strengthen security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

Improving QoS and Service Level Agreement of Mobile Application at Transport Layer using Fuzzy Logic Mapping

Mobile applications and mobile application environment of next generation networks require enhanced quality of service (QoS) to support user’s service level agreement (SLA). This paper presents an adaptation technique at transport layer to minimize the impact of varying and adverse network condition along with security and priority to satisfy the SLA. The paper extends the transport layer funct...

متن کامل

Distance-Aware Beamforming for Multiuser Secure Communication Systems

Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems)  are possible alternatives to provide security for such applications. In this paper, we consid...

متن کامل

Application of Artificial Neural Networks for Analysis of Flexible Pavements under Static Loading of Standard Axle

In this study, an artificial neural network was developed in order to analyze flexible pavement structure and determine its critical responses under the influence of standard axle loading. In doing so, more than 10000 four-layered flexible pavement sections composed of asphalt concrete layer, base layer, subbase layer, and subgrade soil were analyzed under the impact of standard axle loading. P...

متن کامل

Artificial Neural Network Modeling for the Management of Oil Slick Transport in the Marine Environments

Due to an increase in demand of petroleum products which are transported by vessels or exported by pipelines, oil spill management becomes a controversial issue in coastal environment safety as well as making serious financial problems. After spilling oil in the water body, oil spreads as a thin layer on the water surface. Currents, waves and wind are the main causes of oil slick transport. The...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015