CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH374
DOI: 10.1109/saint.2004.1266117
|View full text |Cite
|
Sign up to set email alerts
|

Malicious sniffing systems detection platform

Abstract: Among various types of attacks on an Ethernet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(27 citation statements)
references
References 5 publications
0
27
0
Order By: Relevance
“…This attack is known as the "sniffing attack". [6] Another type of impact, called active, is a result of active attacks. This type of attack requires an injection of information in the network, or interacts with other nodes.…”
Section: Zrpmentioning
confidence: 99%
“…This attack is known as the "sniffing attack". [6] Another type of impact, called active, is a result of active attacks. This type of attack requires an injection of information in the network, or interacts with other nodes.…”
Section: Zrpmentioning
confidence: 99%
“…A sniffing recognition platform in view of ARP (address resolution protocol) and RTT (round trip time) can be utilized to recognize a sniffing framework running on a network [28].…”
Section: Defending Sniffer Attacksmentioning
confidence: 99%
“…So, it can be concluded that sometimes through the old IP address is being assigned to a new user still the chances of accessing the data by some DNS cache and the data belonging to a particular user may become accessible to some other user violating the privacy of the original user [14]- [16]. With use of thin clients which run with as few resources as possible and do not store any user data like password and all cannot be steel the data.…”
Section: F Internet Protocol (Ip) Address Problemmentioning
confidence: 99%