Title :
Hijacking spoofing attack and defense strategy based on Internet TCP sessions
Author :
Yongle Wang ; JunZhang Chen
Author_Institution :
Xuchang Ploughs the Recent Inf. Sci. Res. Inst., Xuchang, China
Abstract :
With the advent of technology and the rapid development of network applications, network security issues become a priority need to consider a variety of network applications, in a variety of spoofing attacks, how to prevent spoofing TCP session hijacking became the focus of network intrusion prevention one. This article first explains the concept of TCP session hijacking, and its principle and the resulting harm caused elaborated, describing the attacker to conduct a session hijacking attack process, the final against session hijacking attacks can not prevent or eliminate a fundamental characteristic, put forward the corresponding defense strategies.
Keywords :
Internet; security of data; transport protocols; Internet TCP sessions; TCP session hijacking attack; network applications; network security issues; spoofing attacks; Automation; IP networks; Instrumentation and measurement; Internet; Security; Servers; Telecommunication traffic; Session hijacking; defense strategy; principle; spoofing attacks;
Conference_Titel :
Instrumentation and Measurement, Sensor Network and Automation (IMSNA), 2013 2nd International Symposium on
Conference_Location :
Toronto, ON
DOI :
10.1109/IMSNA.2013.6743326