Essays about: "session hijacking"
Found 4 essays containing the words session hijacking.
-
1. Adversarial Attacks against Behavioral-based Continuous Authentication
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Online identity theft and session hijacking attacks have become a major hazardin recent years and are expected to become more frequent in the years to come.Unlike the traditional authentication methods, continuous authentication based onthe characterization of user behavior in interactions with the computer system allowsto continuously verify the user’s identity and mitigates the risk of such forms ofmalicious access. READ MORE
-
2. The major security challenges to cloud computing.
University essay from Högskolan i Borås/Institutionen Handels- och IT-högskolanAbstract : Cloud computing is the computing model in which the computing resources such as software, hardware and data are delivered as a service through a web browser or light-weight desktop machine over the internet (Wink, 2012). This computing model abolishes the necessity of sustaining the computer resources locally hence cuts-off the cost of valuable resources (Moreno, Montero & Llorente, 2012). READ MORE
-
3. Security Issues of SIP
University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikationAbstract : Voice over IP (VoIP) services based on Session Initiation Protocol (SIP) has gained much attention as compared to other protocols like H.323 or MGCP over the last decade. SIP is the most favorite signaling protocol for the current and future IP telephony services, and it‘s also becoming the real competitor for traditional telephony services. READ MORE
-
4. Design and implementation of Wireless Packet Level Authentication
University essay fromAbstract : Secure user authentication, authorization and access control have become the major challenges in any wireless security system, often due to certain wireless network characteristics such as lack of infrastructure, low power availability and mobility. Taking advantage of such network characteristics, an attacker can launch several security attacks like Denial of Service (DoS) attacks, packet spoofing and session hijacking attacks. READ MORE