Abstract

With the advent of technology and the rapid development of network applications, network security issues become a priority need to consider a variety of network applications, in a variety of spoofing attacks, how to prevent spoofing TCP session hijacking became the focus of network intrusion prevention one. This article first explains the concept of TCP session hijacking, and its principle and the resulting harm caused elaborated, describing the attacker to conduct a session hijacking attack process, the final against session hijacking attacks can not prevent or eliminate a fundamental characteristic, put forward the corresponding defense strategies.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call