2014
DOI: 10.2478/cait-2014-0032
|View full text |Cite
|
Sign up to set email alerts
|

A Prevention Model for Session Hijack Attacks in Wireless Networks Using Strong and Encrypted Session ID

Abstract: Most of the web applications are establishing the web session with the client. It is very important to protect the wireless networks against session hijacking attack. Session Hijack attack is easy to execute and difficult to detect. Wireless networks do not have specific boundary regions for the packets to be transferred. As the data packets are transferred in air, the chances of sniffing the network packets by the hackers or attackers are high by using the network sniffing tools. In this paper, we have propos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…Wireless networks do not have specific boundary regions for the packets to be transferred. As the data packets are transferred in air, the chances of sniffing the network packets by the hackers or attackers are high by using the network sniffing tools [12] For hijack attack, the hijacker takes over a session between sender and receiver and he will interrupt the communication and make one of real user disconnect from network. Then, other user will believe that they are talking to write party and send private and confidential information to the hijacker by accident.…”
Section: Hijack Attackmentioning
confidence: 99%
“…Wireless networks do not have specific boundary regions for the packets to be transferred. As the data packets are transferred in air, the chances of sniffing the network packets by the hackers or attackers are high by using the network sniffing tools [12] For hijack attack, the hijacker takes over a session between sender and receiver and he will interrupt the communication and make one of real user disconnect from network. Then, other user will believe that they are talking to write party and send private and confidential information to the hijacker by accident.…”
Section: Hijack Attackmentioning
confidence: 99%
“…In [3] paper, the session-id is encrypted. But as session-id already a signed value so encrypted session id cannot play a meaningful role where session regeneration can be a goof reliable.…”
Section: Fig 13: Session Startmentioning
confidence: 99%
“…So empowered, the abuser can do anything the legitimate user could do. There are several vulnerabilities to the current web application as listed in Table 2 below: Table 2: Vulnerabilities in website application [4] No Vulnerability Description Session prediction…”
Section: Session Hijacking Attackmentioning
confidence: 99%
“…Predicting the session ID of a web session by using a brute force attack. 4 Session fixing The session ID is fixed by the attacker before the client establishes the session with the server. 5…”
Section: Session Hijacking Attackmentioning
confidence: 99%