Security

Access Rates Analysis Of Routing Stack Transformation

Free registration required

Executive Summary

The security of data is a very important aspect of every institution. One of the methods of boosting data security is by use of routing stack transformation. This approach successfully hides router inter-networking operating system from potential hackers by giving wrong or inaccurate results about the target operating system (including its manufacturer, model and version). This process normally involves changing the system kernel and modifying the Transmission Control Protocol/Internet Protocol (TCP/IP) parameters. In this paper, the authors investigated the effects of the above changes in data transmission rates (bit rates). This was done by use of experimentations before and after these alterations. A number of packets were sent from source and the time they take to reach the target is measured.

  • Format: PDF
  • Size: 890.57 KB