The lack of confirmation allows the host machines to trick the IP address of targeted vehicle [1], this can admit the host machine to use the focus machine for mean purposes or can use the possessions of targeted automobile. The targeted tool maybe used as ghost machine and maybe used for DDOS/DOS attacks. That’s reason skilled is a need to secure IP addresses of all the machines communicated on some network.
Author(s) Details:
Hinna Hafeez,
Kinnaird College, Lahore, Pakistan.
Tayyaba
Khalil,
Govt.
Graduate College (W), Wahdat Colony, Lahore, Pakistan.
Please see the link here: https://stm.bookpi.org/RPST-V6/article/view/9864
No comments:
Post a Comment