Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing 2014
DOI: 10.4108/icst.collaboratecom.2014.257327
|View full text |Cite
|
Sign up to set email alerts
|

Preventing session hijacking in collaborative applications with hybrid cache-supported one-way hash chains

Abstract: Session hijacking attacks of social network websites are one of the commonly experienced cyber threats in today's Internet especially with the unprecedented proliferation of wireless networks and mobile applications. To address this problem, we propose a cache supported hybrid two-dimensional one-way hash construction to handle social networks' user sessions authentication in collaborative applications efficiently. The solution, which presents a major redesign from [18], is based on utilizing two-dimensional O… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…This manner it's simple for an assailant to predict consequent packet just in case it needs to forecast the TCP sequence range of consequent packet. In the application level, assailant takes over the session moreover and attempts to form new session with freshly made session token which may be taken or predicted in such method that it authenticates the assailant with the machine targeted to require over an existing connection or create new connections [14].…”
Section: A Session Hijacking Sessionmentioning
confidence: 99%
“…This manner it's simple for an assailant to predict consequent packet just in case it needs to forecast the TCP sequence range of consequent packet. In the application level, assailant takes over the session moreover and attempts to form new session with freshly made session token which may be taken or predicted in such method that it authenticates the assailant with the machine targeted to require over an existing connection or create new connections [14].…”
Section: A Session Hijacking Sessionmentioning
confidence: 99%
“…Even if an attacker gets the data it is very tough for him to find the real data from the packets. SSL channels use public key 28 bits and symmetric key 256 bits which make the encryptions method more complex, strong and more protected [2].…”
Section: Network Layer 41 Secure Socket Layermentioning
confidence: 99%
“…Spoofing and De authentication can still occur. The Author in [7] proposed a hybrid scheme that utilizes one-way hashing and sparse caching technique, but practically it is not possible to implement their research is focused on hashing, but they have not described how to prevent from the session hijacking attack.…”
Section: Literature Reviewsmentioning
confidence: 99%