DocumentCode :
2031350
Title :
Securing computer networks communication by modifying computer network communication protocols
Author :
Youssef, M.W.
Author_Institution :
Comput. & Inf. Div., SHOURA Assembly, Cairo, Egypt
fYear :
2011
fDate :
23-25 Aug. 2011
Firstpage :
619
Lastpage :
626
Abstract :
This research presents a technique to protect computer networks communication by modifying communication protocol identifier. The main advantage of this technique is preventing "man in the middle" meddling from reconstructing sessions from collected data. Consequently, this approach can overcome seamless attacks performed by passive tapping and nonintrusive data capturing techniques.
Keywords :
computer network security; protocols; computer network communication protocols; computer network communication security; man in the middle meddling; nonintrusive data capturing technique; passive tapping technique; seamless attacks; Computers; Encapsulation; IP networks; Monitoring; Protocols; Security; Computer Network; Computer Security; Network Addressing; Network Protocols; Network Security; Protocol Identifiers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
ITS Telecommunications (ITST), 2011 11th International Conference on
Conference_Location :
St. Petersburg
Print_ISBN :
978-1-61284-668-2
Type :
conf
DOI :
10.1109/ITST.2011.6060130
Filename :
6060130
Link To Document :
بازگشت