Title :
Securing computer networks communication by modifying computer network communication protocols
Author_Institution :
Comput. & Inf. Div., SHOURA Assembly, Cairo, Egypt
Abstract :
This research presents a technique to protect computer networks communication by modifying communication protocol identifier. The main advantage of this technique is preventing "man in the middle" meddling from reconstructing sessions from collected data. Consequently, this approach can overcome seamless attacks performed by passive tapping and nonintrusive data capturing techniques.
Keywords :
computer network security; protocols; computer network communication protocols; computer network communication security; man in the middle meddling; nonintrusive data capturing technique; passive tapping technique; seamless attacks; Computers; Encapsulation; IP networks; Monitoring; Protocols; Security; Computer Network; Computer Security; Network Addressing; Network Protocols; Network Security; Protocol Identifiers;
Conference_Titel :
ITS Telecommunications (ITST), 2011 11th International Conference on
Conference_Location :
St. Petersburg
Print_ISBN :
978-1-61284-668-2
DOI :
10.1109/ITST.2011.6060130