• Corpus ID: 212548618

A Review on Detection of Session Hijacking and Ip Spoofing

@inproceedings{Bharti2013ARO,
  title={A Review on Detection of Session Hijacking and Ip Spoofing},
  author={Abhishek Kumar Bharti and Maggi Goyal and Manoj Chaudhary},
  year={2013}
}
In today’s world the computer networks where the packets are sent over the network form client to server for getting the services and server to client to provide the services. As the packets are moving in the network there are vulnerable to numerous types of attacks can be done on the packets . Either it is wireless network or wired network, one of the most common attacks is man-in-the-middle attack, in which session hijacking and IP spoofing has been the most attempted attack. As compare to… 

Figures from this paper

Smartphone's hotspot security issues and challenges

A smartphone hotspot Intrusion Detection system (IDS) which simulates the detection of the attacks (especially DOS attacks), on smartphone hotspots connections is proposed.

Mitigating Masquerade using Nonce in Symmetric Key Distribution - Survey

The usage of nonces is explored in various cryptographic and network security applications in symmetric key distribution environment so as to prevent active attacks like masquerade attacks.

IoT Network Security: Requirements, Threats, and Countermeasures

The differences between IoT and IT systems, the need for IoT security solutions, and the key components required for IoT network security system architecture are discussed and the types of IoT attacks are surveyed, grouping them based on their impact.

Designing secure web and mobile-based information system for dissemination of students’ examination results: the suitability of soft design science methodology

The security goals for the proposed secure information system design architecture were explored and incorporated in all stages of the design of system architecture and contributes to body of knowledge by developing secure information systems architecture using a system thinking approach.

Cyber‐Securing IoT Infrastructure by Modeling Network Traffic

Smartphones Hotspots Intrusion Detection System (SHIDS)

A smartphone hotspot Intrusion Detection system (SHIDS) which simulates the detection of the attacks (especially DOS attacks) on smartphone hotspots connections and attempts to reduce the possibility of DoS attack over hotspot connections.

References

SHOWING 1-10 OF 11 REFERENCES

A Dynamic Method to Detect IP Spoofing on Data Network Using Ant Algorithm

An ant-based traceback approach uses flow level information to identify the spoofing request and the simulations results show that this approach discards almost 90% of spoofed IP request.

CONTROLLING IP SPOOFING THROUGH PACKET FILTERING

IP address spoofing refers to the creation of Internet Protocol packets with a forged source IP address, called spoofing, it is a method of attacking a network in order to gain unauthorized access.

Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks

Usability, robustness and accuracy of these intrusion detection techniques are explored by applying them to eight distinct test scenarios and a correlation engine is introduced to maintain the false positives and false negatives at a manageable level.

Exception Agent Detection System for IP Spoofing Over Online Environments

This paper proposes an EADS (Exception agent detection system) for securing the header information carried by IP over online environments and concerns with the deployment of new technique for detecting and eliminating the unknown threats attacks during the data sharing overOnline environments.

A Comparative Study of Security Level of Hotmail, Gmail and Yahoo Mail by Using Session Hijacking Hacking Test

The results show that the Webmail with the highest security level is Yahoo Mail; the second one is Hotmail; and the Web Mail with the lowest securitylevel is Gmail.

Block Spoofed Packets at Source (BSPS): A method for detecting and preventing all types of spoofed source IP packets and SYN flooding packets at source: A theoretical framework

A theoretical framework for a simple and efficient method that detects and blocks all types of source IP spoofed packets including subnet spoofing and TCP/SYN flooding packets at source is presented.

Website Vulnerability to Session Fixation Attacks

The authors found that some 48% of Indonesian websites are vulnerable to session fixation attacks because, contrary to best software engineering practices, many use default session management IDs generated by their development platforms.

G.Manjunath “Wavelet Based Real Time Session Hijack Detection Based On Bluetooth Signal Analysis

  • Srikanth Kamuni et al, GJCAT,
  • 2012

Wavelet Based Real Time Session Hijack Detection Based On Bluetooth Signal Analysis

  • Srikanth Kamuni et al, GJCAT
  • 2012

Hussein “ Block Spoofed Packets at Source ( BSPS ) : A method for Detecting and Preventing All Types of Spoofed Source IP Packets and SYN Flooding Packets at Source

  • International Journal of Networks and Communications
  • 2012