Corpus ID: 212548618

A Review on Detection of Session Hijacking and Ip Spoofing

@inproceedings{Bharti2013ARO,
  title={A Review on Detection of Session Hijacking and Ip Spoofing},
  author={A. Bharti and Maggi Goyal and Manoj Chaudhary},
  year={2013}
}
In today’s world the computer networks where the packets are sent over the network form client to server for getting the services and server to client to provide the services. As the packets are moving in the network there are vulnerable to numerous types of attacks can be done on the packets . Either it is wireless network or wired network, one of the most common attacks is man-in-the-middle attack, in which session hijacking and IP spoofing has been the most attempted attack. As compare to… CONTINUE READING
4 Citations

Figures from this paper

Smartphone's hotspot security issues and challenges
  • 3
Smartphones Hotspots Intrusion Detection System (SHIDS)
  • PDF
IoT Network Security: Requirements, Threats, and Countermeasures
  • PDF

References

SHOWING 1-10 OF 11 REFERENCES
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
  • 44
  • Highly Influential
  • PDF
Exception Agent Detection System for IP Spoofing Over Online Environments
  • 6
  • Highly Influential
  • PDF
Block Spoofed Packets at Source (BSPS): A method for detecting and preventing all types of spoofed source IP packets and SYN flooding packets at source: A theoretical framework
  • 14
Website Vulnerability to Session Fixation Attacks
  • 5
G.Manjunath “Wavelet Based Real Time Session Hijack Detection Based On Bluetooth Signal Analysis
  • Srikanth Kamuni et al, GJCAT,
  • 2012
Hussein “ Block Spoofed Packets at Source ( BSPS ) : A method for Detecting and Preventing All Types of Spoofed Source IP Packets and SYN Flooding Packets at Source
  • International Journal of Networks and Communications
  • 2012
Wavelet Based Real Time Session Hijack Detection Based On Bluetooth Signal Analysis
  • Srikanth Kamuni et al, GJCAT
  • 2012