Header menu link for other important links
Aging protocols that could incapacitate the Internet
Bharate L. M., Patil P.S., , Mane S.M.
Published in International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume: 2.0
Issue: 2.0
Pages: 556.0 - 561.0
The biggest threat to the Internet is the fact that it was never really designed. For e.g., the BGP protocol is used by Internet routers to exchange information about changes to the Internet's network topologies. However, it also is among the most fundamentally broken; as Internet routing information can be poisoned with bogus routing information. Instead, it evolved in fits and start, thanks to various protocols that have been cobbled together to fulfill the needs of the moment. Few of protocols from them were designed with security in mind. or if they were sported no more than was needed to keep out a nosy neighbor, not a malicious attacker. The result is a welter of aging protocols susceptible to exploit on an Internet scale. Here are six Internet protocols that could standto be replaced sooner rather than later or are (mercifully) on the way out.
About the journal
JournalInternational Journal of Modern Trends in Engineeringand Research (IJMTER)
PublisherInternational Journal of Modern Trends in Engineering and Research (IJMTER)
Open Access0