Spelling suggestions: "subject:"TCP reset"" "subject:"TCP beset""
1 |
Causes of TCP Reset in Mobile Web BrowsingBethalam, Anil Varma, Amburu, Prasanna Kumar January 2011 (has links)
Web browsing has been one of the most popular activities on the internet. The increasing importance of the Web in everyday life calls for device-independent access to existing web sites. Although, there is full Web access available on mobile phones the user experience is often poor when compared to the Web user experience on Personal Computer (PC). Therfore, it is important for the Internet service provider to find the indications of user dissatisfaction from the network. While using the mobile Web, user can normally abort the transfer by pressing the stop or reset buttons in the browsers, leaving the page being downloaded by following a bookmark or can close the connection. Such events can be observed through the TCP reset (RST) flag from traffic on network level. In this thesis we have investigated the possible causes of TCP RST flags mobile Web session is interrupted. We further analyze up to what extent we can rely on TCP RST flags for being an indication of user dissatisfaction in mobile web browsing. Therefore, an experiment testbed is developed to capture the TCP packet traces during controlled active tests. Results are gathered using mobile devices with four popular mobile operating systems (OS). The trace files captured are analyzed using perl script to dicern the flow and focusing on the TCP RST flag during the flow. Further, TSTAT tool is used to validate our trace files. / 0760-882089
|
2 |
Soubor laboratorních úloh k demonstraci počítačových útoků / Collection of laboratory works for demonstration of computer attacksPlašil, Matouš January 2015 (has links)
Diploma thesis describes published attacks on computers and computer networks. Principles of footprinting such as availability check, OS detection, port scanning were described. Next part explains attacks on confidentiality, integrity and availability. In the practical part were created four laboratory tasks and a virtual environment which allowed testing of ARP spoofing, DNS spoofing, SSL strip, Cross-site scripting, SQL injection, flooding attacks (TCP, ICMP, UDP), TCP reset and attack on operating system using backdoor with Metasploit framework. In practical part were also created video samples with attacks and documentation for teachers.
|
Page generated in 0.031 seconds