The research and realization of IP hijacking

被引:0
|
作者
Zhang, Xin
Sha, Xueling
Liu, Haiyan
机构
关键词
tcp initiative attack; IP hijacking; link desynchronization; ack broadcast storm;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IP hijacking is one of tcp initiative attack. It can completely take over control the network connection, which is communicating from the low floor without discovered by user, so it can bring big threat to network. In this paper, it mainly introduces the implementation theory and process of IP hijacking, and analyses method of implementation through socket programming, then proposes a detailed and feasible policy, which can defend the IP hijacking.
引用
收藏
页码:136 / 139
页数:4
相关论文
共 50 条
  • [1] Analysis of IP Prefix Hijacking and Traffic Interception
    Latt, Khin Thida
    Ohara, Yasuhiro
    Uda, Satoshi
    Shinoda, Yoichi
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (07): : 22 - 31
  • [2] Realization of GPS Dynamic Hijacking Based on Software Radio
    School of Physics and Electronic Information, Inner Mongolia Normal University, Hohhot, China
    J. Phys. Conf. Ser., 2
  • [3] A Novel TCP/IP Header Hijacking Attack on SDN
    Mohammadi, Ali Akbar
    Hussain, Rasheed
    Oracevic, Alma
    Kazmi, Syed Muhammad Ahsan Raza
    Hussain, Fatima
    Aloqaily, Moayad
    Son, Junggab
    IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,
  • [4] iSPY: Detecting IP prefix hijacking on my own
    Zhang, Zheng
    Zhang, Ying
    Hu, Y. Charlie
    Mao, Z. Morley
    Bush, Randy
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2008, 38 (04) : 327 - 338
  • [5] Probabilistic IP prefix authentication (PIPA) for prefix hijacking
    Seoul National University, Korea, Republic of
    Proc. Int. Conf. Future Internet Technol., CFI, 1600, (52-55):
  • [6] A Novel TCP/IP Header Hijacking Attack on SDN
    Mohammadi, Ali Akbar
    Hussain, Rasheed
    Oracevic, Alma
    Kazmi, Syed Muhammad Ahsan Raza
    Hussain, Fatima
    Aloqaily, Moayad
    Son, Junggab
    INFOCOM WKSHPS 2022 - IEEE Conference on Computer Communications Workshops, 2022,
  • [7] iSPY: Detecting IP Prefix Hijacking on My Own
    Zhang, Zheng
    Zhang, Ying
    Hu, Y. Charlie
    Mao, Z. Morley
    Bush, Randy
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (06) : 1815 - 1828
  • [8] Improved Calculation of AS Resilience Against IP Prefix Hijacking
    Wuebbeling, Matthias
    Meier, Michael
    PROCEEDINGS OF THE 2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS - LCN WORKSHOPS 2016, 2016, : 121 - 128
  • [9] IP Prefix Hijacking Detection Using Idle Scan
    Hong, Seong-Cheol
    Ju, Hong-Taek
    Hong, James W.
    MANAGEMENT ENABLING THE FUTURE INTERNET FOR CHANGING BUSINESS AND NEW COMPUTING SERVICES, PROCEEDINGS, 2009, 5787 : 395 - 404
  • [10] A study of IP prefix hijacking in cloud computing networks
    Liu, Yujing
    Peng, Wei
    Su, Jinshu
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2201 - 2210