2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 2017
DOI: 10.1109/dasc-picom-datacom-cyberscitec.2017.218
|View full text |Cite
|
Sign up to set email alerts
|

Co_Hijacking Monitor: Collaborative Detecting and Locating Mechanism for HTTP Spectral Hijacking

Abstract: With the rapid growth of mobile internet, mobile application, like website navigation, searching, e-Shopping and app download, etc. are all popular in worldwide. Meanwhile, it become more and more popular that traditional HTTP protocol, which is also applying in not only web browsing but also communication between mobile application clients and servers. Besides, it has made HTTP Hijacking profitable. Furthermore, it has brought a lot of troubles for users, network operators and ISP. We analyze the principle of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…The IP spoofing attack occurs on the transport and network layer, where the attacker takes the IP address and delivers data to its autonomous station, where it can be altered [26], [29], [31], [32], [34], [35]. Table 10 shows the summary of MITM attacks on TCP/IP layers.…”
Section: B Affect On Tcp/ip Layersmentioning
confidence: 99%
See 2 more Smart Citations
“…The IP spoofing attack occurs on the transport and network layer, where the attacker takes the IP address and delivers data to its autonomous station, where it can be altered [26], [29], [31], [32], [34], [35]. Table 10 shows the summary of MITM attacks on TCP/IP layers.…”
Section: B Affect On Tcp/ip Layersmentioning
confidence: 99%
“…References MITM [22], [25], [26], [27], [28], [29], [31], [32], [33], [34], [35], [37], [41], [42], [43], [44], [45] Session Hijacking [23], [24], [26], [30], [31], [34], [35], [36], [37], [38], [39], [40], [46], [47], [48], [49], [50], [51] hijacking occurs during the HTTP session when the user gets its ID, whereas in-network layer interception occurs during TCP and User Datagram Protocol (UDP) sessions [48]. Fig.…”
Section: Attack Domainmentioning
confidence: 99%
See 1 more Smart Citation
“…Web server is mainly responsible for receiving and sending HTTP messages [5]. After receiving the HTTP request sent by the client, the server will analyze the JSON data, get the result from the query database, encapsulate the result as JSON data, and return it to the client as the response of the HTTP message.…”
Section: Web Servermentioning
confidence: 99%
“…In a traditional setting, a network service provider would deploy dedicated measurement agents, such as optical splitters, network test access points, etc., in the core network. Measurements would be taken passively to collect data [6]. However, the traditional setting has several drawbacks to be applied to smart homes.…”
Section: Introductionmentioning
confidence: 99%