DocumentCode
3308482
Title
Session Hijack in the Great Firewall of China
Author
Pang, Sheng ; Chen, Changjia ; Jia, Jinkang
Author_Institution
Sch. of Electr. & Inf. Engneering, Beijing Jiaotong Univ., Beijing
Volume
1
fYear
2009
fDate
25-26 April 2009
Firstpage
473
Lastpage
476
Abstract
ldquoGreat Firewall of Chinardquo can close the specific connection by sending reset packets. However, it can be easily ignored through several simple methods, such as both endpoints ignore resets, encryption, and soon. Session hijack is an old network attack, which is not often used because the attacker canpsilat obtain the resource of the key router. However, the Great Firewall of China can use these routers. And session hijack can be used to restrict cyber crimes by the Great Firewall of China, but it also carry out some bad infection. We described the behavior of session hijack based on above proposal, simulates the hijack process and analyses the RTTs (round trip time) of the process according to the results of simulation, and come up with compare RTT Detecting to detect session hijack.
Keywords
authorisation; computer networks; great firewall of China; network attack; reset packets; round trip time; session hijack; Analytical models; Computer hacking; Computer networks; Cryptography; Delay; Information analysis; Information security; Internet; Proposals; Wireless communication; RTT; TCP/IP; network security; session hijack;
fLanguage
English
Publisher
ieee
Conference_Titel
Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on
Conference_Location
Wuhan, Hubei
Print_ISBN
978-1-4244-4223-2
Type
conf
DOI
10.1109/NSWCTC.2009.277
Filename
4908308
Link To Document