• DocumentCode
    3308482
  • Title

    Session Hijack in the Great Firewall of China

  • Author

    Pang, Sheng ; Chen, Changjia ; Jia, Jinkang

  • Author_Institution
    Sch. of Electr. & Inf. Engneering, Beijing Jiaotong Univ., Beijing
  • Volume
    1
  • fYear
    2009
  • fDate
    25-26 April 2009
  • Firstpage
    473
  • Lastpage
    476
  • Abstract
    ldquoGreat Firewall of Chinardquo can close the specific connection by sending reset packets. However, it can be easily ignored through several simple methods, such as both endpoints ignore resets, encryption, and soon. Session hijack is an old network attack, which is not often used because the attacker canpsilat obtain the resource of the key router. However, the Great Firewall of China can use these routers. And session hijack can be used to restrict cyber crimes by the Great Firewall of China, but it also carry out some bad infection. We described the behavior of session hijack based on above proposal, simulates the hijack process and analyses the RTTs (round trip time) of the process according to the results of simulation, and come up with compare RTT Detecting to detect session hijack.
  • Keywords
    authorisation; computer networks; great firewall of China; network attack; reset packets; round trip time; session hijack; Analytical models; Computer hacking; Computer networks; Cryptography; Delay; Information analysis; Information security; Internet; Proposals; Wireless communication; RTT; TCP/IP; network security; session hijack;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on
  • Conference_Location
    Wuhan, Hubei
  • Print_ISBN
    978-1-4244-4223-2
  • Type

    conf

  • DOI
    10.1109/NSWCTC.2009.277
  • Filename
    4908308