CFP last date
22 July 2024
Reseach Article

Session Clocking Attack Detection and Defense Strategy on TCP Session in Network

Published on May 2016 by Sandip Khote, Amar Shinde
National Conference on Advancements in Computer & Information Technology
Foundation of Computer Science USA
NCACIT2016 - Number 7
May 2016
Authors: Sandip Khote, Amar Shinde
1c81c507-b52b-49bd-9be2-8727645ac59b

Sandip Khote, Amar Shinde . Session Clocking Attack Detection and Defense Strategy on TCP Session in Network. National Conference on Advancements in Computer & Information Technology. NCACIT2016, 7 (May 2016), 32-33.

@article{
author = { Sandip Khote, Amar Shinde },
title = { Session Clocking Attack Detection and Defense Strategy on TCP Session in Network },
journal = { National Conference on Advancements in Computer & Information Technology },
issue_date = { May 2016 },
volume = { NCACIT2016 },
number = { 7 },
month = { May },
year = { 2016 },
issn = 0975-8887,
pages = { 32-33 },
numpages = 2,
url = { /proceedings/ncacit2016/number7/24744-3104/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advancements in Computer & Information Technology
%A Sandip Khote
%A Amar Shinde
%T Session Clocking Attack Detection and Defense Strategy on TCP Session in Network
%J National Conference on Advancements in Computer & Information Technology
%@ 0975-8887
%V NCACIT2016
%N 7
%P 32-33
%D 2016
%I International Journal of Computer Applications
Abstract

TCP-IP model is the most widely used model in internet now days. Security is the most promising thing in online work. In these paper we are introduced some attacks on TCP Session. Attacks like Session hijacking, Session Clocking, and IP sniffing. As well as we introduced some methodologies how to dealing with these attacks.

References
  1. Richard Clayton, et. "Ignoring the Great Firewall of China", Volume 4258/2006 Privacy Enhancing Technologies
  2. Sheng Pang; Changjia Chen; Jinkang Jia, "Session Hijack in the Great Firewall of China," Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on, vol. 1, no. , pp. 473, 476, 25-26 April 2009
  3. Yongle Wang; JunZhang Chen, "Hijacking spoofing attack and defence strategy based on Internet TCP sessions,"
  4. Dhar Sumit. "Switch Sniff. " (March 5, 2002)2nd International Symposium on, vol. , no. , pp. 507, 509, 23-24 Dec. 2013
  5. Ettercap. "Ettercap. " (May 11, 2003)
  6. Graham, Robert. "Sniffing (network wiretap, sniffer) FAQ. " (September 14, 2000)Instrumentation and Measurement, Sensor Network and Automation (IMSNA), 2013
  7. https://www. owasp. org/index. php/Session_hijacking_attack
  8. http://www. windowsecurity. com/articles-tutorials/authentication_and_encryption/Understanding-Man-in-the-Middle-Attacks-ARP-Part3. html
  9. http://stackoverflow. com/questions/22880/what-is-the-best-way-to-prevent-session-hijacking
  10. http://luizfirmino. blogspot. in/search/label/Session%20Hijacking
  11. http://www. linuxjournal. com/article. php?sid=5869
  12. http://www. robertgraham. com/pubs/sniffing-faq. html
  13. http://ettercap. sourceforge. net/
Index Terms

Computer Science
Information Sciences

Keywords

Session Session Hijacking Ip Spoofing Session Clocking Network Security.