2018
DOI: 10.5296/npa.v10i1.12478
|View full text |Cite
|
Sign up to set email alerts
|

Survey of the Protection Mechanisms to the SSL-based Session Hijacking Attacks

Abstract: Web communications between the server and the client are being used extensively. However, session hijacking has become a critical problem for most of the client-server communications. Among different session hijacking attacks, SSL stripping is the most dangerous attack. There are a number of measures proposed to prevent SSL tripping-based session hijacking attacks. However, existing surveys did not summarize all the preventive measures in a comprehensive manner (without much illustration and categorization). T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 18 publications
0
9
0
Order By: Relevance
“…The data for the targeted hardware address and targeted protocol address is received from the ARP request message and utilised in the reply message. The destination device"s ARP cache will be modified, given that it will shortly need to access the sender machine [19]. A unicast is used, rather than a broadcast, to send an ARP reply message to the target device.…”
Section: Background 31 Address Resolution Protocolmentioning
confidence: 99%
“…The data for the targeted hardware address and targeted protocol address is received from the ARP request message and utilised in the reply message. The destination device"s ARP cache will be modified, given that it will shortly need to access the sender machine [19]. A unicast is used, rather than a broadcast, to send an ARP reply message to the target device.…”
Section: Background 31 Address Resolution Protocolmentioning
confidence: 99%
“…The TCP/IP comprises of several communication protocols that are designed to operate over the internet and other private networks [1], hence facilitating the key operations and services across these networks [2]- [4]. It also ensures end to end connectivity by establishing and maintaining communications between the communication entities [5]- [7].…”
Section: Introductionmentioning
confidence: 99%
“…According to Sealpath (2020), user data on transit is vulnerable to attacks because of weak encryption techniques used both on data and wireless networks used for data transmission. Data on transit is at risk from various attacks such as mobile malware, packet sniffing attacks (Bhattacharya & Reddy, 2022), Man-in-the-Middle (MITM) attacks [5], Domain Name System (DNS) poisoning [6], Secure Sockets Layer (SSL) strip session hijacking [7], eavesdropping attack [8], Denial of Service (DoS) attacks, and social engineering attacks [9]. Such risks have contributed to a segment of the population being reluctant to adopt such technology due to the fear of these vulnerabilities including the online fraud [10].…”
Section: Introductionmentioning
confidence: 99%