Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptography

نویسندگان

  • Abhishek Kumar
  • Bharti
  • Manoj Chaudhary
چکیده

Many web applications available today make use of some way of session to be able to communicate between the server and client. Unfortunately, it is possible for an attacker to exploit session in order to impersonate another user at a web application. The session hijacking is the most common type of attack in the infrastructure type of network. The confidentially is not providing under this attack to user information. Session hijacking attack is launched by making fake access point. If we detect the fake access point then we can stop session hijacking, and various techniques had been proposed. In this paper, we are giving a new mechanism to detect the fake access point with the use of sensor nodes in the network. In this mechanism we are also giving the protection against IP Spoofing by the use of public private key cryptography key exchange algorithm. We also discuss the results through simulations in Network Simulator 2.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Prevention of Session Hijacking and I spoofing with Sensor Nodes and Cryptographic Approach

Many web applications available today make use of some way of session to be able to communicate between the server and client. Unfortunately, it is possible for an attacker to exploit session in order to impersonate another user at a web application. The session hijacking is the most common type of attack in the infrastructure type of network. The confidentially is not providing under this atta...

متن کامل

Detecting ARP Spoofing: An Active Technique

The Address Resolution Protocol (ARP) due to its statelessness and lack of an authentication mechanism for verifying the identity of the sender has a long history of being prone to spoofing attacks. ARP spoofing is sometimes the starting point for more sophisticated LAN attacks like denial of service, man in the middle and session hijacking. The current methods of detection use a passive approa...

متن کامل

Survey on Wireless Intrusion Detection Mechanisms

Wireless communication is technology’s one of the promising contributions to mankind. Wireless networks are widely used to transfer sensitive data such as bank details, credit card details, emails etc nowadays. The intrusion detection system for wired network cannot be applied directly for wireless networks. Wireless network does not have specific boundaries since the nodes are moving. Wireless...

متن کامل

Survey on Wireless Intrusion Detection Mechanisms

Wireless communication is technology’s one of the promising contributions to mankind. Wireless networks are widely used to transfer sensitive data such as bank details, credit card details, emails etc nowadays. The intrusion detection system for wired network cannot be applied directly for wireless networks. Wireless network does not have specific boundaries since the nodes are moving. Wireless...

متن کامل

Survey on Wireless Intrusion Detection Mechanisms

Wireless communication is technology’s one of the promising contributions to mankind. Wireless networks are widely used to transfer sensitive data such as bank details, credit card details, emails etc nowadays. The intrusion detection system for wired network cannot be applied directly for wireless networks. Wireless network does not have specific boundaries since the nodes are moving. Wireless...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013