he Internet provides a wealth of information, convenience, and value to its users, but this accessibility makes it extremely vulnerable to motivated and well-equipped users intent on disrupting the flow of information or using it for personal gain. The tools for disruption are readily available to these Internet attackers, ranging from published operating-system weaknesses to executable software ready to exploit such vulnerabilities.A common form of attack is denial of service (DoS). DoS attacks consume a remote host or network's resources, thereby denying or degrading service to legitimate users. Typically, adversaries conduct DoS attacks by flooding the target network and its computers with a large amount of traffic from one or (as in the case of distributed DoS, called DDoS) more computers under the attacker's control. Such attacks are among the toughest to address because they are simple to implement, hard to prevent, and difficult to trace. IP traceback methods provide the victim's network administrators with the ability to identify the address of the true source of the packets causing a DoS. IP traceback is vital for restoring normal network functionality as quickly as possible, preventing reoccurrences, and, ultimately, holding the attackers accountable. 1 Merely identifying the machines and networks that generate attack traffic might seem like a limited goal, but the essential clues it provides can help distinguish the actual attacker. Several efforts are under way to develop attacker-identification technologies on the Internet. This article looks at existing DDoS IP traceback methodologies and future trends.Ideally, the network traffic used in an attack should include information identifying its source. The Internet protocol (IP) specifies a header field in all packets that contains the source IP address, which would seem to allow for identifying every packet's origin. However, the lack of security features in TCP/IP specifications facilitates IP spoofing-the manipulation and falsification of the source address in the header. The Internet's current routing infrastructure is stateless and largely based on destination addresses, but no entity is responsible for ensuring that source addresses are correct. Thus, an attacker could generate offending IP packets that appear to have originated from almost anywhere. Although some network-based DoS attacks use IP spoofing by default, 2 only a small percentage of DDoS attacks use forged source addresses; 3 most attack their targets indirectly through other, previously compromised zombie systems.To prevent this IP address manipulation, Kihong Park and Heejo Lee 4 proposed to install distributed packet filters on autonomous systems over the Internet to stop packets with spoofed IP addresses. Another solution is to set up network routers on ISP networks to ensure that the packets routed from the networks only contain valid source addresses. For both political and technical reasons, this process of blocking invalid packets at routers-called ingress filtering 5 -is not ...
As the Internet revolution moves into full swing, those countries that have not embraced e‐commerce technology will face new hurdles as they seek to develop their economies. Standing in the path of these countries’ attempts to adapt e‐commerce technologies are several key issues that can be broadly defined as trust barriers. Rather than think of the trust issues as barriers one must think of them as assets. Presents a conceptual model and framework that highlight the key factors in business trust relationships within developing countries; information security, technical and industrial infrastructure, education, government, and socio‐cultural factors. These factors are considered in the light of different types of e‐commerce business transactions taking place within and across borders such as business‐to‐business (B2B), business‐to‐consumer (B2C), consumer‐to‐business (C2B), and consumer‐to‐consumer (C2C).
This paper focuses on the disparity that exists between Arab and non‐Arab trading blocs and the potential that e‐commerce offers in narrowing this gap. The current Arab intra‐trade state of affairs is analyzed, targeting potential trade opportunities. These prospects are evaluated, along with the adoption of technology to render advantages to the Arab world. Many countries have and continue to benefit from the acceptance of e‐commerce; understanding its applicability and effectiveness beyond and within the Arab trading blocs is of vital importance to increase trade. Our analysis presents a perspective on regional trade and utilization of technology within the global community and broadening trade possibilities among Arab countries.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.