Essays about: "session hijacking"

Found 4 essays containing the words session hijacking.

  1. 1. Adversarial Attacks against Behavioral-based Continuous Authentication

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Maciej Kufel; [2020]
    Keywords : ;

    Abstract : Online identity theft and session hijacking attacks have become a major hazardin recent years and are expected to become more frequent in the years to come.Unlike the traditional authentication methods, continuous authentication based onthe characterization of user behavior in interactions with the computer system allowsto continuously verify the user’s identity and mitigates the risk of such forms ofmalicious access. READ MORE

  2. 2. The major security challenges to cloud computing.

    University essay from Högskolan i Borås/Institutionen Handels- och IT-högskolan

    Author : Muhammad Inam ul Haq; [2013]
    Keywords : Information security; packet filtering; cloud interface; digital signatures; firewalls; ICMP ping attack; data integrity;

    Abstract : Cloud computing is the computing model in which the computing resources such as software, hardware and data are delivered as a service through a web browser or light-weight desktop machine over the internet (Wink, 2012). This computing model abolishes the necessity of sustaining the computer resources locally hence cuts-off the cost of valuable resources (Moreno, Montero & Llorente, 2012). READ MORE

  3. 3. Security Issues of SIP

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Gulfam Asghar; Qanit Jawed Azmi; [2010]
    Keywords : SIP; registration hijecking; message tempering; Dos; Firewall NAT;

    Abstract : Voice over IP (VoIP) services based on Session Initiation Protocol (SIP) has gained much attention as compared to other protocols like H.323 or MGCP over the last decade. SIP is the most favorite signaling protocol for the current and future IP telephony services, and it‘s also becoming the real competitor for traditional telephony services. READ MORE

  4. 4. Design and implementation of Wireless Packet Level Authentication

    University essay from

    Author : Abdullah Al Hasib; [2009]
    Keywords : ;

    Abstract : Secure user authentication, authorization and access control have become the major challenges in any wireless security system, often due to certain wireless network characteristics such as lack of infrastructure, low power availability and mobility. Taking advantage of such network characteristics, an attacker can launch several security attacks like Denial of Service (DoS) attacks, packet spoofing and session hijacking attacks. READ MORE