• DocumentCode
    3324802
  • Title

    Hijacking spoofing attack and defense strategy based on Internet TCP sessions

  • Author

    Yongle Wang ; JunZhang Chen

  • Author_Institution
    Xuchang Ploughs the Recent Inf. Sci. Res. Inst., Xuchang, China
  • fYear
    2013
  • fDate
    23-24 Dec. 2013
  • Firstpage
    507
  • Lastpage
    509
  • Abstract
    With the advent of technology and the rapid development of network applications, network security issues become a priority need to consider a variety of network applications, in a variety of spoofing attacks, how to prevent spoofing TCP session hijacking became the focus of network intrusion prevention one. This article first explains the concept of TCP session hijacking, and its principle and the resulting harm caused elaborated, describing the attacker to conduct a session hijacking attack process, the final against session hijacking attacks can not prevent or eliminate a fundamental characteristic, put forward the corresponding defense strategies.
  • Keywords
    Internet; security of data; transport protocols; Internet TCP sessions; TCP session hijacking attack; network applications; network security issues; spoofing attacks; Automation; IP networks; Instrumentation and measurement; Internet; Security; Servers; Telecommunication traffic; Session hijacking; defense strategy; principle; spoofing attacks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Instrumentation and Measurement, Sensor Network and Automation (IMSNA), 2013 2nd International Symposium on
  • Conference_Location
    Toronto, ON
  • Type

    conf

  • DOI
    10.1109/IMSNA.2013.6743326
  • Filename
    6743326