DocumentCode :
3308482
Title :
Session Hijack in the Great Firewall of China
Author :
Pang, Sheng ; Chen, Changjia ; Jia, Jinkang
Author_Institution :
Sch. of Electr. & Inf. Engneering, Beijing Jiaotong Univ., Beijing
Volume :
1
fYear :
2009
fDate :
25-26 April 2009
Firstpage :
473
Lastpage :
476
Abstract :
ldquoGreat Firewall of Chinardquo can close the specific connection by sending reset packets. However, it can be easily ignored through several simple methods, such as both endpoints ignore resets, encryption, and soon. Session hijack is an old network attack, which is not often used because the attacker canpsilat obtain the resource of the key router. However, the Great Firewall of China can use these routers. And session hijack can be used to restrict cyber crimes by the Great Firewall of China, but it also carry out some bad infection. We described the behavior of session hijack based on above proposal, simulates the hijack process and analyses the RTTs (round trip time) of the process according to the results of simulation, and come up with compare RTT Detecting to detect session hijack.
Keywords :
authorisation; computer networks; great firewall of China; network attack; reset packets; round trip time; session hijack; Analytical models; Computer hacking; Computer networks; Cryptography; Delay; Information analysis; Information security; Internet; Proposals; Wireless communication; RTT; TCP/IP; network security; session hijack;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on
Conference_Location :
Wuhan, Hubei
Print_ISBN :
978-1-4244-4223-2
Type :
conf
DOI :
10.1109/NSWCTC.2009.277
Filename :
4908308
Link To Document :
بازگشت