首页> 外文会议>International Symposium on Instrumentation and Measurement, Sensor Network and Automation >Hijacking spoofing attack and defense strategy based on Internet TCP sessions
【24h】

Hijacking spoofing attack and defense strategy based on Internet TCP sessions

机译:基于互联网TCP会话的劫持欺骗攻击与防御战略

获取原文
获取外文期刊封面目录资料

摘要

With the advent of technology and the rapid development of network applications, network security issues become a priority need to consider a variety of network applications, in a variety of spoofing attacks, how to prevent spoofing TCP session hijacking became the focus of network intrusion prevention one. This article first explains the concept of TCP session hijacking, and its principle and the resulting harm caused elaborated, describing the attacker to conduct a session hijacking attack process, the final against session hijacking attacks can not prevent or eliminate a fundamental characteristic, put forward the corresponding defense strategies.
机译:随着技术的出现和网络应用的快速发展,网络安全问题成为优先事项需要考虑各种网络应用,在各种欺骗攻击中,如何防止欺骗TCP会话劫持成为网络入侵防御的重点。本文首先解释了TCP会议劫持的概念,其原则和由此产生的危害令阐述,描述攻击者进行会议劫持攻击过程,最终对会话劫持攻击无法预防或消除基本特征,提出相应的防御战略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号