JoESP

Threat Detection on Linux Systems Using OSquery

[{“box”:0,”content”:”

n

n

 > 

n

n

 > 

n

n

n

n

n

n

n

By [foreach 286]u00a0

u00a0Yogesh Chandrakant Jadhav, Vaibhav Kisan Kadam, Shubham Ramesh Kanase, Srijita Bhattacharjee,

[/foreach]
nJanuary 27, 2023 at 7:04 am

n

nAbstract

n

We have made an EDR tool for Linux Systems using Facebook open-source project OSquery. Making our own EDR tool rather than using a commercial EDR tool helps us gain knowledge about the platform and the security aspect of the platform and gives us the capabilities to detect and investigate security events. In our method, we are collecting the logs on the central server and then we are using these logs to generate the correlation between events which are happening on different Linux endpoints. These events are different events which are taking place in the Linux system like file events, socket events, process events, etc. These events are automatically detected and categorized into different attack vectors to remediate in future. Due to continuous monitoring, we get these events after a specific interval which makes the detection real-time. Users can provide on-the-fly configuration which makes the tool more responsive and accurate and does not collect the garbage data which are not required. We are also providing container security which is a new feature in the open-source tools. In our method, we have designed a system in such a way that we can scale the system and add a scalable amount of nodes in a single deployment.

n

n

n

n

Volume :u00a0u00a09 | Issue :u00a0u00a01 | Received :u00a0u00a0April 26, 2022 | Accepted :u00a0u00a0April 29, 2022 | Published :u00a0u00a0May 4, 2022n[if 424 equals=”Regular Issue”][This article belongs to Journal of Advances in Shell Programming(joasp)] [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue Threat Detection on Linux Systems Using OSquery under section in Journal of Advances in Shell Programming(joasp)] [/if 424]
Keywords Endpoint detection and response, OSquery, Fleet server, Linux, malware

n

n

n

n

n


n[if 992 equals=”Transformative”]

n

n

Full Text

n

n

n

[/if 992][if 992 not_equal=”Transformative”]

n

n

Full Text

n

n

n

[/if 992] n


nn

[if 379 not_equal=””]n

[foreach 379]n

n[/foreach]

n[/if 379]

n

References

n[if 1104 equals=””]n

1. Facebook. (2019). SQL powered operating system instrumentation, monitoring, and analytics. [Online]. Available from: https://github.com/osquery/osquery
2. Rapid7 Blog. (2019 Jul). Introduction to osquery for threat detection and DFIR. [Online]. Available from: https://www.rapid7.com/blog/post/2016/05/09/introduction-to-osquery-for-threatdetection-dfir/
3. MITRE. (2021) ATT&CK. [Online]. Available from: https://attack.mitre.org/
4. YARA. (2021). [Online]. Available from: https://yara.readthedocs.io/en/stable/
5. Oracle. (2019). Oracle Security Alert Advisory-CVE-2019-272. [Online]. Available from: https://www.oracle.com/security-alerts/alert-cve-2019-2725.html.
6. Reed T, Grenier M. (2017 Nov 2). Osquery—Windows, MacOS, Linux Monitoring and Intrusion Detection. [Online]. 7. Kieseberg P, Neuner S, Schrittwieser S, Schmiedecker M, Weippl E. Real-Time Forensics through Endpoint Visibility. In: Matoušek P, Schmiedecker M, editors. Digital Forensics and Cyber Crime. ICDF2C 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Cham: Springer; 2018; 216. https://doi. org/10.1007/978-3-319-73697-6_2
8. Hurless C. (2019 Sep 10). Exploring Osquery Fleet and Elastic Stack as an Open-source solution to Endpoint Detection and Response. [Online]. SANS Institute Reading Room site.
9. Yin H, Song D, Egele M, Kruegel C, Kirda E. October. Panorama: capturing system-wide information flow for malware detection and analysis. In Proceedings of the 14th ACM conference on Computer and communications security. 2007; 116–127.
10. Gržinić T, González EB. Methods for automatic malware analysis and classification: a survey. Int J Inf Comput Secur. 2022; 17(1–2): 179–203.
11. Kazdagli M, Caramanis C, Shakkottai S, Tiwari M. Early and Robust Malware Detection in Enterprise Networks. 12. Maxwell Dondo, Madeena Sultana, Grant Vandenberghe. Malicious activity detection: An analysis of current tools and methodologies for network defence in operational networks. Reference Document DRDC-RDDC-2021-D078. Canada: Defence Research and Development Canada; 2021.

nn[/if 1104] [if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””], [/if 1106]
  2. n[/foreach]

n[/if 1104]

n[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=”Regular Issue”] Regular Issue[/if 424] Open Access Article

n

Journal of Advances in Shell Programming

ISSN: 2395-6690

Editors Overview

joasp maintains an Editorial Board of practicing researchers from around the world, to ensure manuscripts are handled by editors who are experts in the field of study.

n

“},{“box”:4,”content”:”

n“},{“box”:1,”content”:”

    By  [foreach 286]n

  1. n

    Yogesh Chandrakant Jadhav, Vaibhav Kisan Kadam, Shubham Ramesh Kanase, Srijita Bhattacharjee

    n

  2. [/foreach]

n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Student, Assistant Professor,Department of Computer Science and Engineering, Pillai HOC college of Engineering and Technology, Department of Computer Science and Engineering, Pillai HOC College of Engineering and Technology,Rasayani, Maharashtra, Rasayani, Maharashtra,India, India
  2. n[/if 1175][/foreach]

n

n

n

n

n

Abstract

nWe have made an EDR tool for Linux Systems using Facebook open-source project OSquery. Making our own EDR tool rather than using a commercial EDR tool helps us gain knowledge about the platform and the security aspect of the platform and gives us the capabilities to detect and investigate security events. In our method, we are collecting the logs on the central server and then we are using these logs to generate the correlation between events which are happening on different Linux endpoints. These events are different events which are taking place in the Linux system like file events, socket events, process events, etc. These events are automatically detected and categorized into different attack vectors to remediate in future. Due to continuous monitoring, we get these events after a specific interval which makes the detection real-time. Users can provide on-the-fly configuration which makes the tool more responsive and accurate and does not collect the garbage data which are not required. We are also providing container security which is a new feature in the open-source tools. In our method, we have designed a system in such a way that we can scale the system and add a scalable amount of nodes in a single deployment.n

n

n

Keywords: Endpoint detection and response, OSquery, Fleet server, Linux, malware

n[if 424 equals=”Regular Issue”][This article belongs to Journal of Advances in Shell Programming(joasp)]

n[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal of Advances in Shell Programming(joasp)] [/if 424]

n

n

n


n[if 992 equals=”Transformative”]n

n

n

Full Text

n

n

nn[/if 992]n[if 992 not_equal=”Transformative”]n

n

Full Text

n

n

n

n


[/if 992]n[if 379 not_equal=””]

Browse Figures

n

n

[foreach 379]n

n[/foreach]

n

[/if 379]n

n

References

n[if 1104 equals=””]

1. Facebook. (2019). SQL powered operating system instrumentation, monitoring, and analytics. [Online]. Available from: https://github.com/osquery/osquery
2. Rapid7 Blog. (2019 Jul). Introduction to osquery for threat detection and DFIR. [Online]. Available from: https://www.rapid7.com/blog/post/2016/05/09/introduction-to-osquery-for-threatdetection-dfir/
3. MITRE. (2021) ATT&CK. [Online]. Available from: https://attack.mitre.org/
4. YARA. (2021). [Online]. Available from: https://yara.readthedocs.io/en/stable/
5. Oracle. (2019). Oracle Security Alert Advisory-CVE-2019-272. [Online]. Available from: https://www.oracle.com/security-alerts/alert-cve-2019-2725.html.
6. Reed T, Grenier M. (2017 Nov 2). Osquery—Windows, MacOS, Linux Monitoring and Intrusion Detection. [Online]. 7. Kieseberg P, Neuner S, Schrittwieser S, Schmiedecker M, Weippl E. Real-Time Forensics through Endpoint Visibility. In: Matoušek P, Schmiedecker M, editors. Digital Forensics and Cyber Crime. ICDF2C 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Cham: Springer; 2018; 216. https://doi. org/10.1007/978-3-319-73697-6_2
8. Hurless C. (2019 Sep 10). Exploring Osquery Fleet and Elastic Stack as an Open-source solution to Endpoint Detection and Response. [Online]. SANS Institute Reading Room site.
9. Yin H, Song D, Egele M, Kruegel C, Kirda E. October. Panorama: capturing system-wide information flow for malware detection and analysis. In Proceedings of the 14th ACM conference on Computer and communications security. 2007; 116–127.
10. Gržinić T, González EB. Methods for automatic malware analysis and classification: a survey. Int J Inf Comput Secur. 2022; 17(1–2): 179–203.
11. Kazdagli M, Caramanis C, Shakkottai S, Tiwari M. Early and Robust Malware Detection in Enterprise Networks. 12. Maxwell Dondo, Madeena Sultana, Grant Vandenberghe. Malicious activity detection: An analysis of current tools and methodologies for network defence in operational networks. Reference Document DRDC-RDDC-2021-D078. Canada: Defence Research and Development Canada; 2021.

n[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

n


n[if 1114 equals=”Yes”]n

n[/if 1114]”},{“box”:2,”content”:”

Regular Issue Open Access Article

n

n

n

n

n

Journal of Advances in Shell Programming

n

[if 344 not_equal=””]ISSN: 2395-6690[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

Volume 9
Issue 1
Received April 26, 2022
Accepted April 29, 2022
Published May 4, 2022

n

n

n

n

Editor

n

n


n

Reviewer

n

n


n n

n”},{“box”:6,”content”:”“}]

Read More
JoESP

Network Monitoring Tool in Shell Programming

[{“box”:0,”content”:”

n

n

 > 

n

n

 > 

n

n

n

n

n

n

n

By [foreach 286]u00a0

u00a0Mohit Jaiswal, Pallavi Kaur Jauhar, Shubhendra Singh, Rashi Agarwal,

[/foreach]
nJanuary 27, 2023 at 6:48 am

n

nAbstract

n

Network monitoring is the systematic effort of a computer network to detect slow or failing network components such as overloaded or crashed/frozen servers, failing routers, failed switches, or other problematic devices. The network monitoring system notifies the network administrator in the event of a network failure or other outage. Network management is a subset of network monitoring. Network monitoring is typically accomplished through the use of software applications and tools. Network monitoring services are widely used to determine whether a given Web server is operational and properly connected to networks around the world. Many servers that perform this function offer a more comprehensive view of the Internet and networks. While constantly monitoring the reliability of a network and searching for trends, the monitoring system tracks and logs network parameters. Among them are the data transmission rate (throughput), error rates, downtime/uptime, use-time percentages, and response time to user and automated inputs and requests. When predefined parameter thresholds are exceeded, alarms are triggered, and network fault management processes are initiated.

n

n

n

n

Volume :u00a0u00a08 | Issue :u00a0u00a03 | Received :u00a0u00a0March 14, 2022 | Accepted :u00a0u00a0March 31, 2022 | Published :u00a0u00a0April 7, 2022n[if 424 equals=”Regular Issue”][This article belongs to Journal of Advances in Shell Programming(joasp)] [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue Network Monitoring Tool in Shell Programming under section in Journal of Advances in Shell Programming(joasp)] [/if 424]
Keywords Shell Script, Operating System, MySQL, LAMP, tcpdump, User Datagram Protocol (UDP)

n

n

n

n

n


n[if 992 equals=”Transformative”]

n

n

Full Text

n

n

n

[/if 992][if 992 not_equal=”Transformative”]

n

n

Full Text

n

n

n

[/if 992] n


nn

[if 379 not_equal=””]n

[foreach 379]n

n[/foreach]

n[/if 379]

n

References

n[if 1104 equals=””]n

1. Techopedia. Bundled Software: What Does Bundled Software Mean? [Online]. Available from https://www.techopedia.com/definition/4240/bundled-software
2. Digital Ocean (31-Jul-2021). What is a Kernel? [Online]. Available from https://www.digitalocean.com/community/tutorials/what-is-a-kernel
3. TechTarget Contributor. Shell [Online]. Available from https://www.techtarget.com/searchdatacenter/definition/shell 4. How do I use the command-line shell? [Online]. Available from https://courses.cs.washington.edu/courses/cse140/13wi/shell-usage.html
5. Cloudflare. What is TCP/IP? [Online]. Available from https://www.cloudflare.com/enin/learning/ddos/glossary/tcp-ip/ 6. Paloalto Networks. Source and Destination NAT Example [Online]. Available from https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/networking/nat/nat-configurationexamples/source-and-destination-nat-example.html
7. Madpackets. TCP Sequence and Acknowledgement Numbers Explained [Online]. Available from https://madpackets.com/2018/04/25/tcp-sequence-and-acknowledgement-numbers-explained/
8. Khan Academy. User Datagram Protocol (UDP) [Online]. Available from https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:theinternet/xcae6f4a7ff015e7d:transporting-packets/a/user-datagram-protocol-udp
9. Tech Target. Mariusz Zydyk. Address Resolution Protocol (ARP) [Online]. Available from https://www.techtarget.com/searchnetworking/definition/Address-Resolution-Protocol-ARP
10. Tutorials Point. Shell Scripting Tutorial [Online]. Available from https://www.tutorialspoint.com/unix/shell_scripting.htm

nn[/if 1104] [if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””], [/if 1106]
  2. n[/foreach]

n[/if 1104]

n[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=”Regular Issue”] Regular Issue[/if 424] Open Access Article

n

Journal of Advances in Shell Programming

ISSN: 2395-6690

Editors Overview

joasp maintains an Editorial Board of practicing researchers from around the world, to ensure manuscripts are handled by editors who are experts in the field of study.

n

“},{“box”:4,”content”:”

n“},{“box”:1,”content”:”

    By  [foreach 286]n

  1. n

    Mohit Jaiswal, Pallavi Kaur Jauhar, Shubhendra Singh, Rashi Agarwal

    n

  2. [/foreach]

n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Student, HOD,Department of Information Technology, University Institute of Engineering and Technology, Department of Information Technology, University Institute of Engineering and Technology,Uttar Pradesh, Uttar Pradesh,India, India
  2. n[/if 1175][/foreach]

n

n

n

n

n

Abstract

nNetwork monitoring is the systematic effort of a computer network to detect slow or failing network components such as overloaded or crashed/frozen servers, failing routers, failed switches, or other problematic devices. The network monitoring system notifies the network administrator in the event of a network failure or other outage. Network management is a subset of network monitoring. Network monitoring is typically accomplished through the use of software applications and tools. Network monitoring services are widely used to determine whether a given Web server is operational and properly connected to networks around the world. Many servers that perform this function offer a more comprehensive view of the Internet and networks. While constantly monitoring the reliability of a network and searching for trends, the monitoring system tracks and logs network parameters. Among them are the data transmission rate (throughput), error rates, downtime/uptime, use-time percentages, and response time to user and automated inputs and requests. When predefined parameter thresholds are exceeded, alarms are triggered, and network fault management processes are initiated.n

n

n

Keywords: Shell Script, Operating System, MySQL, LAMP, tcpdump, User Datagram Protocol (UDP)

n[if 424 equals=”Regular Issue”][This article belongs to Journal of Advances in Shell Programming(joasp)]

n[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal of Advances in Shell Programming(joasp)] [/if 424]

n

n

n


n[if 992 equals=”Transformative”]n

n

n

Full Text

n

n

nn[/if 992]n[if 992 not_equal=”Transformative”]n

n

Full Text

n

n

n

n


[/if 992]n[if 379 not_equal=””]

Browse Figures

n

n

[foreach 379]n

n[/foreach]

n

[/if 379]n

n

References

n[if 1104 equals=””]

1. Techopedia. Bundled Software: What Does Bundled Software Mean? [Online]. Available from https://www.techopedia.com/definition/4240/bundled-software
2. Digital Ocean (31-Jul-2021). What is a Kernel? [Online]. Available from https://www.digitalocean.com/community/tutorials/what-is-a-kernel
3. TechTarget Contributor. Shell [Online]. Available from https://www.techtarget.com/searchdatacenter/definition/shell 4. How do I use the command-line shell? [Online]. Available from https://courses.cs.washington.edu/courses/cse140/13wi/shell-usage.html
5. Cloudflare. What is TCP/IP? [Online]. Available from https://www.cloudflare.com/enin/learning/ddos/glossary/tcp-ip/ 6. Paloalto Networks. Source and Destination NAT Example [Online]. Available from https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/networking/nat/nat-configurationexamples/source-and-destination-nat-example.html
7. Madpackets. TCP Sequence and Acknowledgement Numbers Explained [Online]. Available from https://madpackets.com/2018/04/25/tcp-sequence-and-acknowledgement-numbers-explained/
8. Khan Academy. User Datagram Protocol (UDP) [Online]. Available from https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:theinternet/xcae6f4a7ff015e7d:transporting-packets/a/user-datagram-protocol-udp
9. Tech Target. Mariusz Zydyk. Address Resolution Protocol (ARP) [Online]. Available from https://www.techtarget.com/searchnetworking/definition/Address-Resolution-Protocol-ARP
10. Tutorials Point. Shell Scripting Tutorial [Online]. Available from https://www.tutorialspoint.com/unix/shell_scripting.htm

n[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

n


n[if 1114 equals=”Yes”]n

n[/if 1114]”},{“box”:2,”content”:”

Regular Issue Open Access Article

n

n

n

n

n

Journal of Advances in Shell Programming

n

[if 344 not_equal=””]ISSN: 2395-6690[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

Volume 8
Issue 3
Received March 14, 2022
Accepted March 31, 2022
Published April 7, 2022

n

n

n

n

Editor

n

n


n

Reviewer

n

n


n n

n”},{“box”:6,”content”:”“}]

Read More
stm journals
JoESP

Network Models: TCP/Internet Protocol vs. OSI

[{“box”:0,”content”:”

n

n

 > 

n

n

 > 

n

n

n

n

n

n

n

By [foreach 286]u00a0

u00a0Chetan Prakash,

[/foreach]
nJanuary 27, 2023 at 6:39 am

n

nAbstract

n

Networking your computer dramatically enhances their ability to communicate and most computer are used more for communication than computation. The positive impact of computers grows in direct proportion to the number and type of computers that participate in network. One of the greatest benefits of TCP/IP is that it provides interoperable communication between all types of hardware and operating system. TCP/IP is an abbreviation for transmission control protocol/internet protocol. TCP/IP refers to the entire suite of data communication protocols. This article review majorly looks at how TCP/IP is used as a reliable network transmission protocol all over the world. TCP/IP is also used in a private computer network as a communications protocol. This discussion deals with the structure of TCP/IP, its components, its benefits over the OSI model, and OSI model and its component and difference between both models. We have also discussed its underlying protocol that is IP (Internet Protocol), TCP (Transmission Control Protocol) and UDP (User Diagram Protocol).

n

n

n

n

Volume :u00a0u00a08 | Issue :u00a0u00a03 | Received :u00a0u00a0December 12, 2021 | Accepted :u00a0u00a0December 18, 2021 | Published :u00a0u00a0December 20, 2021n[if 424 equals=”Regular Issue”][This article belongs to Journal of Advances in Shell Programming(joasp)] [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue Network Models: TCP/Internet Protocol vs. OSI under section in Journal of Advances in Shell Programming(joasp)] [/if 424]
Keywords Internet networking, protocols, TCP, OSI, application layers

n

n

n

n

n


n[if 992 equals=”Transformative”]

n

n

Full Text

n

n

n

[/if 992][if 992 not_equal=”Transformative”]

n

n

Full Text

n

n

n

[/if 992] n


nn

[if 379 not_equal=””]n

[foreach 379]n

n[/foreach]

n[/if 379]

n

References

n[if 1104 equals=””]n

1. Forouzan BA. TCP/IP protocol suite. McGraw-Hill Higher Education; 2002 Jul 1. 2. Wright GR, Stevens WR. TCP/IP Illustrated, Volume
2 (paperback): The Implementation. Addison-Wesley Professional; 1995 Jan 31.
3. Day JD, Zimmermann H. The OSI reference model. Proceedings of the IEEE. 1983 Dec;71(12):1334-40.
4. Zimmermann H. OSI reference model-the ISO model of architecture for open systems interconnection. IEEE Transactions on communications. 1980 Apr;28(4):425-32.
5. Fenton N. The internet and social networking. Misunderstanding the internet. 2012;123.
6. Xylomenos G, Polyzos GC. TCP and UDP performance over a wireless LAN. IEEE INFOCOM’99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No. 99CH36320) 1999 Mar 21 (Vol. 2, pp. 439-446). IEEE.
7. AL-Dhief FT, Sabri N, Latiff NA, Malik NN, Abbas M, Albader A, Mohammed MA, AL-Haddad RN, Salman YD, Khanapi M, Ghani A. Performance comparison between TCP and UDP protocols in different simulation scenarios. International Journal of Engineering & Technology. 2018;7(4.36):172-6.
8. Wang SY, Chao HL, Liu KC, He TW, Lin CC, Chou CL. Evaluating and Improving the TCP/UDP Performances of IEEE 802.11 (p)/1609 Networks. In2008 IEEE Symposium on Computers and Communications 2008 Jul 6 (pp. 163-168). IEEE.
9. Les Cottrell R, Ansari S, Khandpur P, Gupta R, Hughes-Jones R, Chen M, McIntosh L, Leers F. Characterization and evaluation of TCP and UDP-based transport on real networks. InAnnales des telecommunications 2006 Feb (Vol. 61, No. 1, pp. 5-20). Springer-Verlag.
10. Jestratjew A, Kwiecien A. Performance of HTTP protocol in networked control systems. IEEE Transactions on Industrial Informatics. 2012 Jan 9;9(1):271-6.

nn[/if 1104] [if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””], [/if 1106]
  2. n[/foreach]

n[/if 1104]

n[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=”Regular Issue”] Regular Issue[/if 424] Open Access Article

n

Journal of Advances in Shell Programming

ISSN: 2395-6690

Editors Overview

joasp maintains an Editorial Board of practicing researchers from around the world, to ensure manuscripts are handled by editors who are experts in the field of study.

n

“},{“box”:4,”content”:”

n“},{“box”:1,”content”:”

    By  [foreach 286]n

  1. n

    Chetan Prakash

    n

  2. [/foreach]

n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Student,Department of Electrical Engineering, Delhi Technological University,New Delhi,India
  2. n[/if 1175][/foreach]

n

n

n

n

n

Abstract

nNetworking your computer dramatically enhances their ability to communicate and most computer are used more for communication than computation. The positive impact of computers grows in direct proportion to the number and type of computers that participate in network. One of the greatest benefits of TCP/IP is that it provides interoperable communication between all types of hardware and operating system. TCP/IP is an abbreviation for transmission control protocol/internet protocol. TCP/IP refers to the entire suite of data communication protocols. This article review majorly looks at how TCP/IP is used as a reliable network transmission protocol all over the world. TCP/IP is also used in a private computer network as a communications protocol. This discussion deals with the structure of TCP/IP, its components, its benefits over the OSI model, and OSI model and its component and difference between both models. We have also discussed its underlying protocol that is IP (Internet Protocol), TCP (Transmission Control Protocol) and UDP (User Diagram Protocol).n

n

n

Keywords: Internet networking, protocols, TCP, OSI, application layers

n[if 424 equals=”Regular Issue”][This article belongs to Journal of Advances in Shell Programming(joasp)]

n[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal of Advances in Shell Programming(joasp)] [/if 424]

n

n

n


n[if 992 equals=”Transformative”]n

n

n

Full Text

n

n

nn[/if 992]n[if 992 not_equal=”Transformative”]n

n

Full Text

n

n

n

n


[/if 992]n[if 379 not_equal=””]

Browse Figures

n

n

[foreach 379]n

n[/foreach]

n

[/if 379]n

n

References

n[if 1104 equals=””]

1. Forouzan BA. TCP/IP protocol suite. McGraw-Hill Higher Education; 2002 Jul 1. 2. Wright GR, Stevens WR. TCP/IP Illustrated, Volume
2 (paperback): The Implementation. Addison-Wesley Professional; 1995 Jan 31.
3. Day JD, Zimmermann H. The OSI reference model. Proceedings of the IEEE. 1983 Dec;71(12):1334-40.
4. Zimmermann H. OSI reference model-the ISO model of architecture for open systems interconnection. IEEE Transactions on communications. 1980 Apr;28(4):425-32.
5. Fenton N. The internet and social networking. Misunderstanding the internet. 2012;123.
6. Xylomenos G, Polyzos GC. TCP and UDP performance over a wireless LAN. IEEE INFOCOM’99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No. 99CH36320) 1999 Mar 21 (Vol. 2, pp. 439-446). IEEE.
7. AL-Dhief FT, Sabri N, Latiff NA, Malik NN, Abbas M, Albader A, Mohammed MA, AL-Haddad RN, Salman YD, Khanapi M, Ghani A. Performance comparison between TCP and UDP protocols in different simulation scenarios. International Journal of Engineering & Technology. 2018;7(4.36):172-6.
8. Wang SY, Chao HL, Liu KC, He TW, Lin CC, Chou CL. Evaluating and Improving the TCP/UDP Performances of IEEE 802.11 (p)/1609 Networks. In2008 IEEE Symposium on Computers and Communications 2008 Jul 6 (pp. 163-168). IEEE.
9. Les Cottrell R, Ansari S, Khandpur P, Gupta R, Hughes-Jones R, Chen M, McIntosh L, Leers F. Characterization and evaluation of TCP and UDP-based transport on real networks. InAnnales des telecommunications 2006 Feb (Vol. 61, No. 1, pp. 5-20). Springer-Verlag.
10. Jestratjew A, Kwiecien A. Performance of HTTP protocol in networked control systems. IEEE Transactions on Industrial Informatics. 2012 Jan 9;9(1):271-6.

n[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

n


n[if 1114 equals=”Yes”]n

n[/if 1114]”},{“box”:2,”content”:”

Regular Issue Open Access Article

n

n

n

n

n

Journal of Advances in Shell Programming

n

[if 344 not_equal=””]ISSN: 2395-6690[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

Volume 8
Issue 3
Received December 12, 2021
Accepted December 18, 2021
Published December 20, 2021

n

n

n

n

Editor

n

n


n

Reviewer

n

n


n n

n”},{“box”:6,”content”:”“}]

Read More