A Review on Detection of Session Hijacking and Ip Spoofing

Abhishek Kumar Bharti, Maggi Goyal, Manoj Chaudhary


In today’s world the computer networks where the packets are sent over the network form client to server for getting the services and server to client to provide the services. As the packets are moving in the network there are vulnerable to numerous types of attacks can be done on the packets . Either it is wireless network or wired network, one of the most common attacks is man-in-the-middle attack, in which session hijacking and IP spoofing has been the most attempted attack. As compare to other attacks the success rate of a session hijacking and IP spoofing attack is higher. Earlier studies on detection of session hijacking and IP spoofing is based on the IN and OUT strategy of the session hijacking. This paper serves some of the detection algorithm for detecting the Session Hijacking and IP spoofing along with the current proposed solutions. And the platform it uses for the study are Windows and Linux.

Keywords: Session Hijacking, IP spoofing, Man-in-the-middle-attacks.

Full Text:


DOI: https://doi.org/10.26483/ijarcs.v4i9.1828


  • There are currently no refbacks.

Copyright (c) 2016 International Journal of Advanced Research in Computer Science