2022
DOI: 10.1007/978-981-19-4193-1_58
|View full text |Cite
|
Sign up to set email alerts
|

Review of Detection of Packets Inspection and Attacks in Network Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…Moreover, TCP variants are susceptible to TCP Connection Hijacking attacks, where attackers gain unauthorized access to ongoing TCP connections by exploiting weaknesses in TCP's connection establishment process or session management mechanisms [159]. By intercepting and manipulating packets exchanged during the three-way handshake or session termination process, attackers can hijack existing TCP connections, impersonate legitimate endpoints, or inject malicious payloads into the communication stream [160, [161].…”
Section: Common Attacks In Tcpmentioning
confidence: 99%
“…Moreover, TCP variants are susceptible to TCP Connection Hijacking attacks, where attackers gain unauthorized access to ongoing TCP connections by exploiting weaknesses in TCP's connection establishment process or session management mechanisms [159]. By intercepting and manipulating packets exchanged during the three-way handshake or session termination process, attackers can hijack existing TCP connections, impersonate legitimate endpoints, or inject malicious payloads into the communication stream [160, [161].…”
Section: Common Attacks In Tcpmentioning
confidence: 99%