A Review on Detection of Session Hijacking and Ip Spoofing

Main Article Content

Abhishek Kumar Bharti
Maggi Goyal, Manoj Chaudhary

Abstract

In today’s world the computer networks where the packets are sent over the network form client to server for getting the services and server to client to provide the services. As the packets are moving in the network there are vulnerable to numerous types of attacks can be done on the packets . Either it is wireless network or wired network, one of the most common attacks is man-in-the-middle attack, in which session hijacking and IP spoofing has been the most attempted attack. As compare to other attacks the success rate of a session hijacking and IP spoofing attack is higher. Earlier studies on detection of session hijacking and IP spoofing is based on the IN and OUT strategy of the session hijacking. This paper serves some of the detection algorithm for detecting the Session Hijacking and IP spoofing along with the current proposed solutions. And the platform it uses for the study are Windows and Linux.


Keywords: Session Hijacking, IP spoofing, Man-in-the-middle-attacks.

Downloads

Download data is not yet available.

Article Details

Section
Articles