2023 IEEE International Conference on Consumer Electronics (ICCE) 2023
DOI: 10.1109/icce56470.2023.10043493
|View full text |Cite
|
Sign up to set email alerts
|

Multi-path Data Transmission to Protect Data in Transit

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…Additionally, TCP variants are vulnerable to TCP connection hijacking attacks, where attackers gain unauthorized access to ongoing TCP connections by exploiting weaknesses in TCP's connection establishment process or session management mechanisms. By intercepting and manipulating packets exchanged during the three-way handshake or session termination process, attackers can hijack existing TCP connections, impersonate legitimate endpoints, or inject malicious payloads into the communication stream [183], [184]. TCP connection hijacking attacks can lead to unauthorized access, data manipulation, or the injection of malware into network traffic, highlighting the importance of implementing secure connection establishment and session management protocols.…”
Section: Common Vulnerabilities In Tcpmentioning
confidence: 99%
“…Additionally, TCP variants are vulnerable to TCP connection hijacking attacks, where attackers gain unauthorized access to ongoing TCP connections by exploiting weaknesses in TCP's connection establishment process or session management mechanisms. By intercepting and manipulating packets exchanged during the three-way handshake or session termination process, attackers can hijack existing TCP connections, impersonate legitimate endpoints, or inject malicious payloads into the communication stream [183], [184]. TCP connection hijacking attacks can lead to unauthorized access, data manipulation, or the injection of malware into network traffic, highlighting the importance of implementing secure connection establishment and session management protocols.…”
Section: Common Vulnerabilities In Tcpmentioning
confidence: 99%
“…The method involves sending requests and receiving responses through the HTTP protocol [3]. Within the framework of a "Personal Interactive Transmission Session," we are referring to a kind of communication that is customised for individual users, wherein information is sent in a dynamic and real-time manner [4]. During these sessions, examining the TCP stream entails analysing the attributes, security implications, and performance factors of the data being communicated [5].…”
Section: Introductionmentioning
confidence: 99%